Privacy and utility preserving sensor-data transformations

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Utility Independent Privacy Preserving Data Mining - Horizontally Partitioned Data

Micro data is a valuable source of information for research. However, publishing data about individuals for research purposes, without revealing sensitive information, is an important problem. The main objective of privacy preserving data mining algorithms is to obtain accurate results/rules by analyzing the maximum possible amount of data without unintended information disclosure. Data sets fo...

متن کامل

Preserving Privacy and Utility in RFID Data Publishing

Radio Frequency IDentification (RFID) is a technology that helps machines identify objects remotely. The RFID technology has been extensively used in many domains, such as mass transportation and healthcare management systems. The collected RFID data capture the detailed movement information of the tagged objects, offering tremendous opportunities for mining useful knowledge. Yet, publishing th...

متن کامل

Privacy and Utility Preserving Task Independent Data Mining

Today’s world of universal data exchange, there is a need to manage the risk of unintended information disclosure. Publishing the data about the individuals, without revealing sensitive information about them is an important problem. K-anonymization is the popular approach used for data publishing. The limitations of Kanonymity were overcome by methods like L-diversity, T-closeness, (alpha, K) ...

متن کامل

A Survey of Utility-based Privacy-Preserving Data Transformation Methods

As a serious concern in data publishing and analysis, privacy preserving data processing has received a lot of attention. Privacy preservation often leads to information loss. Consequently, we want to minimize utility loss as long as the privacy is preserved. In this chapter, we survey the utility-based privacy preservation methods systematically. We first briefly discuss the privacy models and...

متن کامل

Evaluating data utility of privacy-preserving pseudonymized location datasets

Pseudonymization is an effective way to publish a location dataset with trajectory information in a privacy-preserving way. We previously proposed a technique of randomly exchanging multiple users’ pseudonyms at a mix zone where the users meet at the same time to prevent an adversary from reidentifying multiple trajectory segments of a target user. However, such a segmentation technique essenti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Pervasive and Mobile Computing

سال: 2020

ISSN: 1574-1192

DOI: 10.1016/j.pmcj.2020.101132