2021
DOI: 10.1007/s12083-021-01077-7
|View full text |Cite
|
Sign up to set email alerts
|

An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 56 publications
(24 citation statements)
references
References 74 publications
0
21
0
Order By: Relevance
“…It gives the percentage of information loss after the anonymization compared to the original attributes. To evaluate the performance of the proposed approach, NCP values from state-of-the-art anonymization approaches such as Mondrian [48], (k,km)- anonymity [52], and clustering-based k-anonymity [10]. We observed an increase in the information loss for a higher k value.…”
Section: B Experimental Analysismentioning
confidence: 92%
See 2 more Smart Citations
“…It gives the percentage of information loss after the anonymization compared to the original attributes. To evaluate the performance of the proposed approach, NCP values from state-of-the-art anonymization approaches such as Mondrian [48], (k,km)- anonymity [52], and clustering-based k-anonymity [10]. We observed an increase in the information loss for a higher k value.…”
Section: B Experimental Analysismentioning
confidence: 92%
“…The Normalized Certainty Penalty (NCP) [59] was used as the standard information loss metric. The information loss is compared to Mondrian [48], (k,km)anonymity [52], and clustering-based k-anonymity [10], which are all prominent anonymization methods.…”
Section: ) Tuple Partitioningmentioning
confidence: 99%
See 1 more Smart Citation
“…The wireless channels used for the transmission of the data pose security threats in the data; this can be solved using blockchain technology [45], [8], [26]. Blockchain technology uses a cryptographic hash function in providing the necessary security to the data [43], [14]. The blockchain implementations have bought significant impacts in providing security, enabling encryption techniques [1], [47].…”
Section: ) Secured Wireless Healthcare Network Using Blockchain Technologymentioning
confidence: 99%
“…Their mechanism also assumed a central trusted server, although they partly used local differential privacy. Onesimu et al proposed a novel privacy protection data collection scheme for IoT-based healthcare service systems [25]. Their method uses a clustering-based anonymous model to develop an efficient privacy protection scheme that satisfies privacy requirements and protects a healthcare IoT from various privacy attacks.…”
mentioning
confidence: 99%