2017
DOI: 10.1088/1757-899x/225/1/012279
|View full text |Cite
|
Sign up to set email alerts
|

An Extensive Study on Data Anonymization Algorithms Based on K-Anonymity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Pureness is therefore more suitable than the classiication metric to measure how often the anonymous counterfactual explanation gives us correct advice. We choose the datasets described in Table 5, as they are all tabular datasets that contain various personal attributes through which individuals could be identiied, and are often used in research about privacy-preserving data mining [26,50,51]. 13 All these datasets contain private information such as inancial and health data that people generally do not want to be made public.…”
Section: = ( )mentioning
confidence: 99%
“…Pureness is therefore more suitable than the classiication metric to measure how often the anonymous counterfactual explanation gives us correct advice. We choose the datasets described in Table 5, as they are all tabular datasets that contain various personal attributes through which individuals could be identiied, and are often used in research about privacy-preserving data mining [26,50,51]. 13 All these datasets contain private information such as inancial and health data that people generally do not want to be made public.…”
Section: = ( )mentioning
confidence: 99%
“…At the operational level, anonymisation and pseudonymisation call for specific techniques. For anonymisation, common practices include generalisation, k-anonymity and randomisation, to name just a few (European Commission, 2014; Simi et al, 2017; Sweeney, 2002). For pseudonymisation, the most common techniques employed are counter, random number generator, cryptographic hash function, message authentication code and encryption (European Union, 2019).…”
Section: Data Management Anonymisation and Pseudonymisationmentioning
confidence: 99%
“…The research of privacy-preserving outsourced data focuses on anonymization-based methods [12][13][14][15][16][17][18], cryptographicbased methods [19][20][21][22][23][24], hybrid methods [2,[25][26][27], and methods that seek to improve the data utility [26,28,29]. Some recent studies have demonstrated the privacy requirements of incremental datasets [30][31][32] and multiple sensitive attributes [33][34][35].…”
Section: Related Workmentioning
confidence: 99%