A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
To address this issue, we propose a novel clustering-based framework to anonymizing transaction data. ...
Based on this framework, we develop PCTA, a generalization-based algorithm to construct anonymizations that incur a small amount of information loss under many different privacy requirements. ...
ACKNOWLEDGEMENTS We would like to thank Manolis Terrovitis, Nikos Mamoulis and Panos Kalnis for providing the implementation of the Apriori anonymization algorithm [33] , and Bradley Malin for helpful ...
doi:10.1145/1971690.1971695
dblp:conf/edbt/Gkoulalas-DivanisL11
fatcat:cgnrkneu6rcn3emotprhxtdb4m
Utility-preserving transaction data anonymization with low information loss
2012
Expert systems with applications
However, the dissemination of transaction data may lead to privacy breaches, as it allows an attacker to link an individual's record to their identity. ...
In this paper, we propose a novel approach for anonymizing data in a way that satisfies data publishers' utility requirements and incurs low information loss. ...
Acknowledgments We would like to thank Manolis Terrovitis, Nikos Mamoulis and Panos Kalnis for providing the implementation of the Apriori anonymization algorithm [23] , as well as Bradley Malin for helpful ...
doi:10.1016/j.eswa.2012.02.179
pmid:22563145
pmcid:PMC3340604
fatcat:tdybvilq55hnnfw4yzabqavaa4
A Survey on Privacy Preserving Data Publishing
2014
International Journal on Cybernetics & Informatics
In recent years, exchanging and publishing data has been common for their wealth of opportunities. Security, Privacy and data integrity are considered as challenging problems in data mining. ...
The Privacy Preservation is an important aspect of data mining to ensure the privacy by various methods. Privacy Preservation is necessary to protect sensitive information associated with individual. ...
Generalization would work on three methods such as Apriori Anonymization (AA), the Constrained Based Anonymization Transaction (COAT) and Privacy-Constrained cluster Based Transaction Algorithm (PCTA). ...
doi:10.5121/ijci.2014.3101
fatcat:vswoffoqrrhcfginzeqmg3m7ee
A Multi-level Clustering Approach for Anonymizing Large-Scale Physical Activity Data
[article]
2019
arXiv
pre-print
This paper presents an effective anonymization approach, Multi-level Clustering based anonymization to anonymize physical activity data. ...
However, publishing such data also brings high privacy risks related to re-identification which makes anonymization necessary. ...
Gkoulalas-Divanis and propose two other algorithms for anonymizing transaction data sets: Privacy-Constrained Clustering-based Transaction Anonymization (PCTA) and Utility-guided Privacy-constrained Clustering-based ...
arXiv:1908.07976v1
fatcat:fwbqyoewlzbuhflenu2mz6le7e
A Distributed Privacy-Utility Tradeoff Method Using Distributed Lossy Source Coding with Side Information
2017
KSII Transactions on Internet and Information Systems
In the age of big data, distributed data providers need to ensure the privacy, while data analysts need to mine the value of data. ...
The second result is that the finer relevance between the public data and private data of source, the finer perturbation of source needed to get the same privacy protection. ...
PCTA(Privacy-constrained Clustering-based Transaction Anonymization) is a heuristic algorithm, which iteratively selects the privacy constraint that requires a small amount of generalization in order to ...
doi:10.3837/tiis.2017.05.026
fatcat:atducffy35f3rm7i46ekevso4e
Utility-guided Clustering-based Transaction Data Anonymization †
2012
TRANSACTIONS ON DATA PRIVACY
unpublished
To address this issue, we propose a novel clustering-based framework to anonymizing transaction data, which provides the basis for designing algorithms that better preserve data utility. ...
Based on this framework, we develop two anonymization algorithms which explore a larger solution space than existing methods and can satisfy a wide range of privacy requirements. ...
Acknowledgements We would like to thank Manolis Terrovitis, Nikos Mamoulis and Panos Kalnis for providing the implementation of the Apriori anonymization algorithm [47] . ...
fatcat:ja3uvytd4vednesgbtsujagsjy
Ανάλυση ιδιωτικότητας και ανωνυμοποίηση τροχιών κίνησης χρηστών
2016
The proposed algorithm relies on k-anonymity privacy model and consists of three phases: (i) data preprocessing, (ii) automatic identification of privacy vulnerabilities and (iii) data anonymization. ...
Anonymization methods try to preserve privacy and at the same time accommodate for high data utility for the published trajectory data. ...
[4] which improves [3] by proposing the PCTA algorithm for transactional data anonymization. PCTA is a clustering-based approach (inspired from agglomerative clustering). ...
doi:10.26262/heal.auth.ir.283049
fatcat:4p2ch5oh3veazkz2ouhlq7g4wa