2018
DOI: 10.3390/s18072307
|View full text |Cite
|
Sign up to set email alerts
|

Data Privacy Protection Based on Micro Aggregation with Dynamic Sensitive Attribute Updating

Abstract: With the rapid development of information technology, large-scale personal data, including those collected by sensors or IoT devices, is stored in the cloud or data centers. In some cases, the owners of the cloud or data centers need to publish the data. Therefore, how to make the best use of the data in the risk of personal information leakage has become a popular research topic. The most common method of data privacy protection is the data anonymization, which has two main problems: (1) The availability of i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 38 publications
0
16
0
Order By: Relevance
“…Kabou et al [108] presented a comprehensive survey about the PPDDP, and summarized different studies used for the PPDDP. Shi et al [109] presented a method for PPDDP using distance and information entropy concepts. The proposed method ensures that individual privacy is preserved after the data has been subjected to multiple releases.…”
Section: F Privacy Preserving Dynamic Data Publicationmentioning
confidence: 99%
“…Kabou et al [108] presented a comprehensive survey about the PPDDP, and summarized different studies used for the PPDDP. Shi et al [109] presented a method for PPDDP using distance and information entropy concepts. The proposed method ensures that individual privacy is preserved after the data has been subjected to multiple releases.…”
Section: F Privacy Preserving Dynamic Data Publicationmentioning
confidence: 99%
“…Microaggregation is a perturbative data protection method (Shi et al 2018), in which small clusters in a dataset can be replaced each original record by the centred of the corresponding cluster (each cluster should have between k and 2k elements), the larger the k, the larger the information loss and the lower the disclosure risk. It ensures k-anonymity only when multivariate microaggregation is applied processing all the variables of the dataset (Mahawaga Arachchige et al 2020;Du et al 2020).…”
Section: Recent Advances In Data Anonymisationmentioning
confidence: 99%
“…For preserving the privacy, the algorithms in privacy models practice different approaches. ese approaches can be categorized to (i) generalization [1][2][3][4][5][13][14][15] (i.e., greedily convert the more specialized values to less specialized values), (ii) anatomy [25,26] (i.e., partition the QI and S attributes), and (iii) microaggregation [29,30] (i.e., dataset is partitioned into clusters where QI values of records are replaced with the mean of value). e proposed work in this paper considers the syntactic data privacy, using generalization and anatomy for MSAs.…”
Section: Data Privacy Models Andmentioning
confidence: 99%