2018
DOI: 10.3390/app8050783
|View full text |Cite
|
Sign up to set email alerts
|

A New Approach to Privacy-Preserving Multiple Independent Data Publishing

Abstract: Featured Application: The Merging method might apply to publish the datasets sequentially from the different organizations where it will ensure more data utility and privacy. Abstract:We study the problem of privacy preservation in multiple independent data publishing. An attack on personal privacy which uses independent datasets is called a composition attack. For example, a patient might have visited two hospitals for the same disease, and his information is independently anonymized and distributed by the tw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
58
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(58 citation statements)
references
References 41 publications
0
58
0
Order By: Relevance
“…Furthermore, optimal anonymization has been demonstrated to be an NP-Hard problem [62]. Moreover, high dimensionality renders this technique ineffective because the identities of the primary record holders can be unmasked by merging the data with either the public or background information [62], [63].…”
Section: ) T-closeness Approachmentioning
confidence: 99%
“…Furthermore, optimal anonymization has been demonstrated to be an NP-Hard problem [62]. Moreover, high dimensionality renders this technique ineffective because the identities of the primary record holders can be unmasked by merging the data with either the public or background information [62], [63].…”
Section: ) T-closeness Approachmentioning
confidence: 99%
“…Several works of privacy-preserving and security issues are extensively studied in different applications. For example, Hasan et al [41] presented a new method for handling the privacy issue of independent published data. Liu and Li [42] mentioned a clustering-based method for anonymity problem in IoT devices.…”
Section: Privacy-preserving Data Miningmentioning
confidence: 99%
“…Hassan et al [5] described a model to preserve the confidentiality on multiple independent data publishing. This model concentrates on the new direction and introduces a composition attack.…”
Section: Related Workmentioning
confidence: 99%