2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET) 2018
DOI: 10.1109/iccsdet.2018.8821140
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy Preserving Scheme for Big data Publishing in the Cloud using k-Anonymization and Hybridized Optimization Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…Regulation here can curb the adverse effects of these negative externalities arising from trading and significantly contribute to welfare efficient and complete markets (where supply equals demand) [25] [26]. Examples of practical ways to implement regulations suggested in existing literature include legislative property rights on consumer personal data shared between the supply and demand side [14], technical metrics (e.g., DP) being adopted by demand side data intermediaries (e.g., ad-networks) to check on the degree of IP breach [6], and frameworks such as those developed in [27,28,29,30] to improve security and privacy for BigData systems (e.g., HDFS). Specifically, in relation to the data intermediary settings such as in Figure 1, De Corni'ere and Nijs [31] For more details on the interplay between differential privacy and mechanism design, [7] gives a comprehensive survey.…”
Section: Related Literaturementioning
confidence: 99%
“…Regulation here can curb the adverse effects of these negative externalities arising from trading and significantly contribute to welfare efficient and complete markets (where supply equals demand) [25] [26]. Examples of practical ways to implement regulations suggested in existing literature include legislative property rights on consumer personal data shared between the supply and demand side [14], technical metrics (e.g., DP) being adopted by demand side data intermediaries (e.g., ad-networks) to check on the degree of IP breach [6], and frameworks such as those developed in [27,28,29,30] to improve security and privacy for BigData systems (e.g., HDFS). Specifically, in relation to the data intermediary settings such as in Figure 1, De Corni'ere and Nijs [31] For more details on the interplay between differential privacy and mechanism design, [7] gives a comprehensive survey.…”
Section: Related Literaturementioning
confidence: 99%
“…Therefore, a new dragon PSO algorithm is suggested to establish a k-anonymization criteria to derive the fitness function that represents the privacy and utility levels of cloud migration services. The experiments using an Adult database verify the efficiency of the privacy-preserved model against information loss risks [157]. Moreover, the work in [158] presents a data privacy-preserved PSO algorithm for cloud computing.…”
Section: B Data Privacymentioning
confidence: 73%
“…Madan and Goswami 37 have proposed an anonymization-based model for the protection and privacy preservation in the cloud. This method uses k-anonymity criteria, which uses the presented Dragonfly-based Particle Swarm Optimization (Dragonfly-PSO) algorithm to copy K records in the database.…”
Section: Related Workmentioning
confidence: 99%
“…To preserving anonymity, rules to restrict the sharing of patient-specific medical data have particular importance. 37,38 This research helps maintain privacy in the healthcare environment by providing a combined method for developing and improving the anonymization model. Section 3.1 defines the recommended system's architecture to the healthcare cloud.…”
Section: Proposed Workmentioning
confidence: 99%