20,272 Hits in 3.0 sec

Anonymization-based attacks in privacy-preserving data publishing

Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Jian Pei
2009 ACM Transactions on Database Systems  
In this article, we show that knowledge of the mechanism or algorithm of anonymization for data publication can also lead to extra information that assists the adversary and jeopardizes individual privacy  ...  Data publishing generates much concern over the protection of individual privacy. Recent studies consider cases where the adversary may possess different kinds of knowledge about the data.  ...  Anonymization-Based Attacks in Privacy-Preserving Data Publishing • 8:5 Observation 1. If a table T is anonymized to T * which satisfies l -diversity, it can suffer from a minimality attack.  ... 
doi:10.1145/1538909.1538910 fatcat:lyymv44rqzfsbly7eleal4un3u

Information Flow Security Models for Cloud Computing

Congdong Lv, Ji Zhang, Zhoubao Sun, Gang Qian
2020 Computers Materials & Continua  
For privacy preserving trajectory data publishing, we propose a differential privacy based (k-Ψ)-anonymity method to defend against re-identification and probabilistic inference attack.  ...  Traditional k-anonymous trajectory data publishing technologies cannot effectively protect user privacy against attackers with strong background knowledge.  ...  A series of methods based on (k-δ)-anonymity are proposed for privacy preserving trajectory data publishing. k-anonymity cannot protect spatio-temporal trajectory data from the probabilistic attacks, so  ... 
doi:10.32604/cmc.2020.011232 fatcat:2ulqjw26evbjvogsj3s3t6kpku

Privacy Preserving Techniques in Social Networks Data Publishing - A Review

Amardeep Singh, Divya Bansal, Sanjeev Sofat
2014 International Journal of Computer Applications  
Privacy preserving techniques are based on that notion.  ...  [34] Reviewed existing anonymization techniques for privacy preserving publishing of social network data. 2008 Guha et al.  ... 
doi:10.5120/15282-3880 fatcat:mc5nmhiwxzdo7fpd7jfptjiyjq

Protecting Sensitive Labels in Social Network Data Anonymization

Mingxuan Yuan, Lei Chen, Philip S. Yu, Ting Yu
2013 IEEE Transactions on Knowledge and Data Engineering  
In this paper, we propose a scheme namely K-degree-L-diversity model useful for preserving social network data.  ...  Privacy preservation is the major problem when sharing data's in social networks. Various Privacy models are developed to avoid node reidentification.  ...  IV.CONCLUSION In this paper, we surveyed a few recent studies on anonymization techniques for privacy preserving publishing of social network data.  ... 
doi:10.1109/tkde.2011.259 fatcat:hcvlt2p2qzc2pmfeehf2f2vao4

A Technological Survey on Privacy Preserving Data Publishing

Rajshree Srivastava, Kritika Rani
2017 International Journal of Trend in Scientific Research and Development  
Hence, privacy preserving and data publishing can be defined as tool and methods for publishing information while preserving privacy of the records.  ...  In this paper, there is a survey of various techniques and algorithm designed so far in order to preserve privacy of the data.  ...  In order to preserve the data there are various techniques which are being introduced in Privacy-preserving data publishing (ppdp).  ... 
doi:10.31142/ijtsrd3587 fatcat:jn3eovur3faabjkvlijrllcwjq

Sustaining Practices for On Demand & Deterministic Data Publishing using Privacy Preservation

Shubham Vishnudev Joshi
2020 International Journal of Software & Hardware Research in Engineering  
Once the category of published data can be interrogated the contextual determination becomes vital.  ...  In today"s age of hand held devices, smart phones, the data is just seat back in cloud and as per the use called on demand. Thus  ...  So anonymization techniques are used before releasing the data and this procedure is called as privacy preserving data publishing.  ... 
doi:10.26821/ijshre.8.4.2020.8407 fatcat:2pvdns7vcfcxzn2i4htsux6yiu

Data Publishing Techniques and Privacy Preserving

Ajit Singh
2019 International Journal for Information Security Research  
This review paper studies all existing Privacy Preserving Data Publishing (PPDP) schemes using data generalization.  ...  The term privacy is defined as an action where the data is kept hidden from either anonymous user, server to avoid use of malpractice of the data [2], [3] .  ...  It also explores the result analysis based upon certain parameters of privacy preserving data publishing.  ... 
doi:10.20533/ijisr.2042.4639.2019.0101 fatcat:gdrm2a6lkrgkxezclakdoiazfe

Anonymization in Social Ne tworks: A Survey on the issues of Data Privacy in Social Network Sites

A. Praveena, Dr.S. Smys
2016 International Journal Of Engineering And Computer Science  
the existing anonymization techniques for privacy preserving publishing of social net-work data.  ...  This leads for privacy-preserving social network data mining, which is the discovery of information and relationships from social network data without violating privacy.  ...  CATEGORIES OF ANONYMIZATION METHODS In privacy preserving data publishing, in order to prevent privacy attacks, data should be anonymized properly before it is released.  ... 
doi:10.18535/ijecs/v5i3.07 fatcat:oashkvfh6rgvrpfso2knjeb23e

Privacy Preserving Data Publishing: A Classification Perspective

A N, Charlie Obimbo
2014 International Journal of Advanced Computer Science and Applications  
Privacy Preserving Data Publishing (PPDP) is a way to allow one to share anonymous data to ensure protection against identity disclosure of an individual.  ...  Most works reported in literature on privacy preserving data publishing for classification task handle numerical data. However, most real life data contains both numerical and non-numerical data.  ...  Minimizing Redundancy in Published Anonymized Data In literature, all the existing non-interactive privacy preserving models publish data once and made the data available for the interested parties.  ... 
doi:10.14569/ijacsa.2014.050919 fatcat:ym4xui4gtba6rdp7mvi3dbxhp4

Data Privacy in Data Engineering, the Privacy Preserving Models and Techniques in Data Mining and Data Publishing: Contemporary Affirmation of the Recent Literature

Fuad AliMohammedAl-Yarimi, Sonajharia Minz
2012 International Journal of Computer Applications  
Privacy preserving for data engineering methods like mining and publishing etc., with the advancement of the rapid development of technologies like Internet and distributed computing has turned out to  ...  be one of the most important research areas of interest and has also triggered a serious issue of concern in accordance with the personal data usage in the recent times.  ...  Corruption attacks exist in privacy preserving data publishing in the conventional anonymity-group approach.  ... 
doi:10.5120/9676-4103 fatcat:obyi6o2tbbhxrhdzupqt3p4aia

Privacy Preservation in Data Centric Environment using K-Anonymity

Shrinkhala Shinghai
2019 International Journal for Research in Applied Science and Engineering Technology  
In this article, we have compared two methods K-anonymity and the inbuilt simulator ARX tool to ensure who can provide higher privacy on medical databases in data-intensive environments.  ...  In numerous cases, these are creating concerns while sharing helpful records.  ...  This paper shares the knowledge of K-anonymity which is a broad method to preserve privacy while data publishing.  ... 
doi:10.22214/ijraset.2019.9027 fatcat:s7vkdq7nwzgbnfn7wmgxz756pq

L–Diversity-Based Semantic Anonymaztion for Data Publishing

Emad Elabd, Hatem Abdulkader, Ahmed Mubark
2015 International Journal of Information Technology and Computer Science  
Therefore, there is a need to apply suitable privacy preserving techniques on the published data. K-anonymity and L-diversity are well known techniques for data privacy preserving.  ...  Nowadays, publishing data publically is an important for many purposes especially for scientific research. Publishing this data in its raw form make it vulnerable to privacy attacks.  ...  [6] introduced several privacy preserving methods in data publishing such as randomization, sampling, suppression, data swapping and perturbation.  ... 
doi:10.5815/ijitcs.2015.10.01 fatcat:wtnycimvfrdebloqpi42hkya5e

M-Privacy Preserving Synergetic for Data Publishing

Priya V. Mundafale, Prof. Gurudev Sawarkar
2014 International Journal of Computer Trends and Technology  
Privacy is breached if one learns anything about data. Privacy preserving data publishing for a single database has been extensively studied in recent years.  ...  Our goal is to publish an anonymized view of the integrated data, T * , which will be immune to attacks.  ... 
doi:10.14445/22312803/ijctt-v7p141 fatcat:ddx6s64gfjbdrhlikixjwlrq4u

A Systematic Review on Privacy Preserving Data Publishing Techniques

Prathamesh P. Churi, Computer Science and Information Technology, Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune, India, Ambika V. Pawar, Computer Science and Information Technology, Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune, India
2019 Journal of Engineering Science and Technology Review  
It also explores the result analysis based upon certain parameters of privacy preserving data publishing.  ...  IoT-privacy based healthcare system, Machine learning in Healthcare data with privacy, Maintaining privacy of healthcare big-data, privacy preserving cloud storage of healthcare data etc.  ... 
doi:10.25103/jestr.126.03 fatcat:w7uwznrdjfepjbwnueaudytpq4

A New Method for Preserving Privacy in Data Publishing Against Attribute and Identity Disclosure Risk

R.Mahesh, Dr.T.Meyyappan
2020 Zenodo  
Sharing, transferring, mining and publishing data are fundamental operations in day to day life. Preserving the privacy of individuals is essential one.  ...  K-anonymity method preserves privacy of individuals against identity disclosure attack alone. But Attribute disclosure attack makes compromise this method.  ...  In this In this paper, a new anonymization based method is proposed for preserving the privacy of sensitive attribute values against identity and attribute disclosure attacks.  ... 
doi:10.5281/zenodo.4013312 fatcat:rgjnnxdovbbydjn73ntzwezkpa
« Previous Showing results 1 — 15 out of 20,272 results