2020
DOI: 10.1109/access.2020.2980235
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Privacy Properties for Data Publishing of Relational Data

Abstract: Recent advances in telecommunications and database systems have allowed the scientific community to efficiently mine vast amounts of information worldwide and to extract new knowledge by discovering hidden patterns and correlations. Nevertheless, all this shared information can be used to invade the privacy of individuals through the use of fusion and mining techniques. Simply removing direct identifiers such as name, SSN, or phone number is not anymore sufficient to prevent against these practices. In numerou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
38
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 56 publications
(39 citation statements)
references
References 231 publications
(182 reference statements)
0
38
0
1
Order By: Relevance
“…Moreover, adjusting TSP heuristics to leverage lightweight microaggregationbased approaches is an interesting research path to follow. In addition, although the values of the privacy parameter k are typically low (i.e., 3,4,5,6), we plan to study the effect of larger values of k on our solution. Last but not least, since microaggregation is essentially a data-oriented procedure, we will study how our solution adapts to data structures from specific domains, such as healthcare, transportation, energy, and the like.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, adjusting TSP heuristics to leverage lightweight microaggregationbased approaches is an interesting research path to follow. In addition, although the values of the privacy parameter k are typically low (i.e., 3,4,5,6), we plan to study the effect of larger values of k on our solution. Last but not least, since microaggregation is essentially a data-oriented procedure, we will study how our solution adapts to data structures from specific domains, such as healthcare, transportation, energy, and the like.…”
Section: Discussionmentioning
confidence: 99%
“…Other approaches have focused on the efficiency of the microaggregation procedure, for example, the Fast Data-oriented Microaggregation (FDM) method proposed by Mortazavi et al [25] efficiently anonymizes large multivariate numerical datasets for multiple successive values of k. The interested readers can find more detailed information about microaggregation in Reference [5,26].…”
Section: Related Work On Microaggregationmentioning
confidence: 99%
See 1 more Smart Citation
“…In this conceptual overview, we mainly present the overview of data collected from the individuals, different actors involved in the anonymization scenario, anonymization techniques applied on respective data, anonymous data to be published for analytics/mining purposes, and privacy breaches that can occur during published data analytics. The typical PPDP scenario involves five types of actors [57]. The brief description about each actor along with examples is summarized in Figure 4 (b).…”
Section: Overview Of Privacy Preserving Data Publishing and Its mentioning
confidence: 99%
“…Primarily, user privacy is realized by data anonymization [124]. The main idea behind this method revolves around encrypting/removing any type of personally identifiable data.…”
mentioning
confidence: 99%