نتایج جستجو برای: k anonymity

تعداد نتایج: 382632  

2008
KHALED EL EMAM

Objective: There is increasing pressure to share health information and even make it publicly availab However, such disclosures of personal health information raise serious privacy concerns. To alleviate such concerns, it is possible to anonymize the data before disclosure. One popular anonymization approach is kanonymity. There have been no evaluations of the actual re-identification probabili...

2017
Haitao Zhang Chenxue Wu Zewei Chen Zhao Liu Yunhong Zhu

Analyzing large-scale spatial-temporal k-anonymity datasets recorded in location-based service (LBS) application servers can benefit some LBS applications. However, such analyses can allow adversaries to make inference attacks that cannot be handled by spatial-temporal k-anonymity methods or other methods for protecting sensitive knowledge. In response to this challenge, first we defined a dest...

2008
Valentina Ciriani Sabrina De Capitani di Vimercati Sara Foresti Pierangela Samarati

3 k-Anonymity with hierarchy-based generalization 12 3.1 Problem complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3.2 Algorithms for k-anonymity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 3.2.1 Samarati’s Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 3.2.2 Incognito . . . . . ...

2014
Srinivasa L. Chakravarthy V. Valli Kumari

k-Anonymity is one of the most popular conventional techniques for protecting the privacy of an individual. The shortcomings in the process of achieving k-Anonymity are presented and addressed by using Coalitional Game Theory (CGT) [1] and Concept Hierarchy Tree (CHT). The existing system considers information loss as a control parameter and provides anonymity level (k) as output. This paper pr...

Privacy issues during data publishing is an increasing concern of involved entities. The problem is addressed in the field of statistical disclosure control with the aim of producing protected datasets that are also useful for interested end users such as government agencies and research communities. The problem of producing useful protected datasets is addressed in multiple computational priva...

Journal: :CoRR 2017
Pratima Biswas Ashok Singh Sairam

In pervasive computing environment, Location Based Services (LBSs) are getting popularity among users because of their usefulness in day-to-day life. LBSs are information services that use geospatial data of mobile device and smart phone users to provide information, entertainment and security in real time. A key concern in such pervasive computing environment is the need to reveal the user’s e...

2010
Phuong Huynh Van Quoc Tran Khanh Dang

Privacy preservation (PP) has become an important issue in the information age to prevent expositions and abuses of personal information. This has attracted much research and k-anonymity is a well-known and promising model invented for PP. Based on the k-anonymity model, this paper introduces a novel and efficient member migration algorithm, called eM, to ensure kanonymity and avoid information...

Journal: :Advances in Electrical and Computer Engineering 2017

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

Journal: :Journal of King Saud University - Computer and Information Sciences 2022

K-anonymity is the most widely used approach to privacy preserving microdata which mainly based on generalization. Although generalization-based k-anonymity approaches can achieve protection objective, they suffer from information loss. Clustering-based have been successfully adapted for k-anonymization as enhance data quality, however, computational complexity of finding an optimal solution ha...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید