Filters








7 Hits in 2.5 sec

PCTA

Aris Gkoulalas-Divanis, Grigorios Loukides
2011 Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society - PAIS '11  
To address this issue, we propose a novel clustering-based framework to anonymizing transaction data.  ...  Based on this framework, we develop PCTA, a generalization-based algorithm to construct anonymizations that incur a small amount of information loss under many different privacy requirements.  ...  ACKNOWLEDGEMENTS We would like to thank Manolis Terrovitis, Nikos Mamoulis and Panos Kalnis for providing the implementation of the Apriori anonymization algorithm [33] , and Bradley Malin for helpful  ... 
doi:10.1145/1971690.1971695 dblp:conf/edbt/Gkoulalas-DivanisL11 fatcat:cgnrkneu6rcn3emotprhxtdb4m

Utility-preserving transaction data anonymization with low information loss

Grigorios Loukides, Aris Gkoulalas-Divanis
2012 Expert systems with applications  
However, the dissemination of transaction data may lead to privacy breaches, as it allows an attacker to link an individual's record to their identity.  ...  In this paper, we propose a novel approach for anonymizing data in a way that satisfies data publishers' utility requirements and incurs low information loss.  ...  Acknowledgments We would like to thank Manolis Terrovitis, Nikos Mamoulis and Panos Kalnis for providing the implementation of the Apriori anonymization algorithm [23] , as well as Bradley Malin for helpful  ... 
doi:10.1016/j.eswa.2012.02.179 pmid:22563145 pmcid:PMC3340604 fatcat:tdybvilq55hnnfw4yzabqavaa4

A Survey on Privacy Preserving Data Publishing

Gokila S, Venkateswari P
2014 International Journal on Cybernetics & Informatics  
In recent years, exchanging and publishing data has been common for their wealth of opportunities. Security, Privacy and data integrity are considered as challenging problems in data mining.  ...  The Privacy Preservation is an important aspect of data mining to ensure the privacy by various methods. Privacy Preservation is necessary to protect sensitive information associated with individual.  ...  Generalization would work on three methods such as Apriori Anonymization (AA), the Constrained Based Anonymization Transaction (COAT) and Privacy-Constrained cluster Based Transaction Algorithm (PCTA).  ... 
doi:10.5121/ijci.2014.3101 fatcat:vswoffoqrrhcfginzeqmg3m7ee

A Multi-level Clustering Approach for Anonymizing Large-Scale Physical Activity Data [article]

Pooja Parameshwarappa University of Maryland Baltimore County)
2019 arXiv   pre-print
This paper presents an effective anonymization approach, Multi-level Clustering based anonymization to anonymize physical activity data.  ...  However, publishing such data also brings high privacy risks related to re-identification which makes anonymization necessary.  ...  Gkoulalas-Divanis and propose two other algorithms for anonymizing transaction data sets: Privacy-Constrained Clustering-based Transaction Anonymization (PCTA) and Utility-guided Privacy-constrained Clustering-based  ... 
arXiv:1908.07976v1 fatcat:fwbqyoewlzbuhflenu2mz6le7e

A Distributed Privacy-Utility Tradeoff Method Using Distributed Lossy Source Coding with Side Information

2017 KSII Transactions on Internet and Information Systems  
In the age of big data, distributed data providers need to ensure the privacy, while data analysts need to mine the value of data.  ...  The second result is that the finer relevance between the public data and private data of source, the finer perturbation of source needed to get the same privacy protection.  ...  PCTA(Privacy-constrained Clustering-based Transaction Anonymization) is a heuristic algorithm, which iteratively selects the privacy constraint that requires a small amount of generalization in order to  ... 
doi:10.3837/tiis.2017.05.026 fatcat:atducffy35f3rm7i46ekevso4e

Utility-guided Clustering-based Transaction Data Anonymization †

Aris Gkoulalas-Divanis, Grigorios Loukides
2012 TRANSACTIONS ON DATA PRIVACY   unpublished
To address this issue, we propose a novel clustering-based framework to anonymizing transaction data, which provides the basis for designing algorithms that better preserve data utility.  ...  Based on this framework, we develop two anonymization algorithms which explore a larger solution space than existing methods and can satisfy a wide range of privacy requirements.  ...  Acknowledgements We would like to thank Manolis Terrovitis, Nikos Mamoulis and Panos Kalnis for providing the implementation of the Apriori anonymization algorithm [47] .  ... 
fatcat:ja3uvytd4vednesgbtsujagsjy

Ανάλυση ιδιωτικότητας και ανωνυμοποίηση τροχιών κίνησης χρηστών

Χριστίνα Ιωάννη Κοντογιαννίδου
2016
The proposed algorithm relies on k-anonymity privacy model and consists of three phases: (i) data preprocessing, (ii) automatic identification of privacy vulnerabilities and (iii) data anonymization.  ...  Anonymization methods try to preserve privacy and at the same time accommodate for high data utility for the published trajectory data.  ...  [4] which improves [3] by proposing the PCTA algorithm for transactional data anonymization. PCTA is a clustering-based approach (inspired from agglomerative clustering).  ... 
doi:10.26262/heal.auth.ir.283049 fatcat:4p2ch5oh3veazkz2ouhlq7g4wa