Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Decomposition: Privacy Preservation for Multiple Sensitive Attributes

Aiming at ensuring privacy preservation in personal data publishing, the topic of anonymization has been intensively studied in recent years. However, existing anonymization techniques all assume each tuple in the microdata table contains one single sensitive attribute (the SSA case), while none paid attention to the case of multiple sensitive attributes in a tuple (the MSA case). In this paper...

متن کامل

A Novel Anonymity Algorithm for Privacy Preserving in Publishing Multiple Sensitive Attributes

Publishing the data with multiple sensitive attributes brings us greater challenge than publishing the data with single sensitive attribute in the area of privacy preserving. In this study, we propose a novel privacy preserving model based on k-anonymity called (α, β, k)-anonymity for databases. (α, β, k)anonymity can be used to protect data with multiple sensitive attributes in data publishing...

متن کامل

SLOMS: A Privacy Preserving Data Publishing Method for Multiple Sensitive Attributes Microdata

Multi-dimension bucketization is a typical method to anonymize multiple sensitive attributes. However, the method leads to low data utility when microdata have more sensitive attributes. In addition, the methods do not generalize quasi-identifiers, which make the anonymous data vulnerable to suffer from linked attacks. To address the problems, the paper proposes a SLOMS method. The method verti...

متن کامل

Multiple Sensitive Attributes based Privacy Preserving Data Mining using k-Anonymity

Data mining is the process of extracting interesting patterns or knowledge from large amount of data. With the development of Data mining technology, an increasing number of data can be mined out to reveal some potential information about the user, because of which privacy of the user may be violated easily. Privacy Preserving Data Mining is used to mine the potential valuable knowledge without...

متن کامل

Privacy-preserving Authentication Using Fingerprint

Biometrics provides us with an effective tool for authentication and is becoming a strong competitor in current authentication mechanisms. However, the concerns about biometrics regarding template security, privacy and revocability impede its further application to network-based scenarios. We propose a novel fingerprint minutiae-based scheme to achieve reliable mutual authentication over insecu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Communications and Mobile Computing

سال: 2020

ISSN: 1530-8669,1530-8677

DOI: 10.1155/2020/8416823