Cooperative privacy game: a novel strategy for preserving privacy in data publishing
نویسندگان
چکیده
منابع مشابه
Privacy - Preserving Data Publishing
The success of data mining relies on the availability of high quality data. To ensure quality data mining, effective information sharing between organizations becomes a vital requirement in today's society. Since data mining often involves person-specific and sensitive information like medical records, the public has expressed a deep concern about their privacy. Privacy-preserving data publishi...
متن کاملTowards Privacy Preserving Data Publishing∗
High quality and useful knowledge is to be found in the integrated data from various organizations, and the discovered knowledge is essential for building intelligent systems such as business analysis and health surveillance. However, concern about breaching privacy is a major obstacle of this process. This project aims to develop new efficient and effective techniques for privacy protection in...
متن کاملPrivacy preserving data publishing: Review
Privacy preserving data publishing (PPDP) methods a new class of privacy preserving data mining (PPDM) technology, has been developed by the research community working on security and knowledge discovery. It is common to share data between two organizations in many application areas. When data are to be shared between parties, there could be some sensitive patterns which should not be disclosed...
متن کاملPrivacy-preserving data publishing for cluster analysis
Releasing person-specific data could potentially reveal sensitive information about individuals. k-anonymization is a promising privacy protection mechanism in data publishing. Although substantial research has been conducted on k-anonymization and its extensions in recent years, only a few prior works have considered releasing data for some specific purpose of data analysis. This paper present...
متن کاملPrivacy-Preserving For Collaborative Data Publishing
This paper mainly deals with the issue of privacy preserving in data mining while collaborating n number of parties and trying to maintain confidentiality of all data providers details while collaborating their database. Here two type of attacks are addressed “insider attack” and “outsider attack”. In insider attack, the data providers use their own records and try to retrieve other data provid...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Human-centric Computing and Information Sciences
سال: 2016
ISSN: 2192-1962
DOI: 10.1186/s13673-016-0069-y