Secure Techniques of Data Anonymization for Privacy Preservation
Abstract
Keywords
Full Text:
PDFReferences
P. Samarati and L. Sweeney, “Protecting privacy when disclosing information:-anonymity and its enforcement through generalization and suppression,” SRI International, SRI-CSL-98-04, 1998
L. Sweeney, “K-Anonymity: A model for protecting privacy,” International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10, no. 5, pp. 557–570, 2002.
M. Barbaro and T. Zeller, “A face is exposed for AOL searcher no. 4417749,” New York Times, 2006.
G. T. Duncan and D. Lambert, “Disclosure-limited data dissemination,” Journal of The American Statistical Association, pp. 10–28, 1986.
D. Lambert, “Measures of disclosure risk and harm,” Journal of Official Statistics, vol. 9, pp. 313–331, 1993.
M. E. Nergiz, M. Atzori, and C. Clifton, “Hiding the presence of individuals from shared databases,” in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), pp. 665–676, 2007
X. Xiao and Y. Tao, “Anatomy: Simple and Effective Privacy Preservation,” Proc. Int‟l Conf. Very Large Data Bases (VLDB), pp. 139-150, 2006.
H. Kargupta, S. Datta, Q.Wang, and K. Sivakumar, “On the privacy preserving properties of random data perturbation techniques,” in Proceedings of the International Conference on Data Mining (ICDM), p. 99, 2003.
Tiancheng Li, Ninghui Li, “Slicing: A New Approach for Privacy Preserving Data Publishing” IEEE Transactions On Knowledge And Data Engineering, Vol. 24, No. 3, March 2012
M. Terrovitis, N. Mamoulis, and P. Kalnis, “Privacy-Preserving Anonymization of Set-Valued Data,” Proc. Int’l Conf. Very Large Data Bases (VLDB), pp. 115-125, 2008.
Y. Xu, K. Wang, A.W.-C. Fu, and P.S. Yu, “Anonymizing Transaction Databases for Publication,” Proc. ACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining (KDD), pp. 767-775, 2008.
DOI: https://doi.org/10.26483/ijarcs.v8i5.3431
Refbacks
- There are currently no refbacks.
Copyright (c) 2017 International Journal of Advanced Research in Computer Science

