2023
DOI: 10.1007/s11276-023-03235-6
|View full text |Cite
|
Sign up to set email alerts
|

Data anonymization evaluation against re-identification attacks in edge storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…The proposed algorithm safeguards privacy breaches against background knowledge attacks while sustaining data utility and privacy. Chen et al [50] devised a framework to measure the level of privacy and usefulness offered by the anonymized datasets. Xia et al [51] developed a clustering and DP-based model for reducing IL in data-releasing scenarios.…”
Section: Anonymization Methods For Enhancing Data Utilitymentioning
confidence: 99%
See 2 more Smart Citations
“…The proposed algorithm safeguards privacy breaches against background knowledge attacks while sustaining data utility and privacy. Chen et al [50] devised a framework to measure the level of privacy and usefulness offered by the anonymized datasets. Xia et al [51] developed a clustering and DP-based model for reducing IL in data-releasing scenarios.…”
Section: Anonymization Methods For Enhancing Data Utilitymentioning
confidence: 99%
“…All three metrics (DM, accuracy, and PD) were used to measure the effectiveness of the proposed approach. For fair comparisons, we prepared anonymized versions of both datasets with varying scales of k. We used both large-scale values (L s , where L s = D k and k = [50,75,100,125,150,175,200,250]), and small-scale values (S s , where S s = D k and k = [5,10,15,20,25,30,35,40]) of k to demonstrate the potency of the proposed approach.…”
Section: Accuracy =mentioning
confidence: 99%
See 1 more Smart Citation
“…More recent work has explored the use of machine learning techniques for de-anonymization [12,13]. Rocher et al [14] proposed an approach to estimate the risk of re-identification in anonymized datasets using machine learning models trained on auxiliary data.…”
Section: De-anonymization Techniquesmentioning
confidence: 99%