Proceedings of the 6th International Conference on Software and Computer Applications 2017
DOI: 10.1145/3056662.3056668
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced (k,e)-anonymous for categorical data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

4
4

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…Thus, the data utility metric is a necessity of the proposed privacy preservation model. Since privacy preservation based on data suppression and generalization has been presented, several data utility metrics have been proposed, e.g., Precision metric (P REC) for data suppression in conjunction with data generalization [36], Discernibility metric (DM ) [37], and Relative error [38] [39]. They will be explained in Sections 3.2.1, 3.2.2, and 3.2.3 respectively.…”
Section: Data Utility Metricmentioning
confidence: 99%
“…Thus, the data utility metric is a necessity of the proposed privacy preservation model. Since privacy preservation based on data suppression and generalization has been presented, several data utility metrics have been proposed, e.g., Precision metric (P REC) for data suppression in conjunction with data generalization [36], Discernibility metric (DM ) [37], and Relative error [38] [39]. They will be explained in Sections 3.2.1, 3.2.2, and 3.2.3 respectively.…”
Section: Data Utility Metricmentioning
confidence: 99%
“…For this reason, software development and management techniques are in place to ensure efficient operations across the software. Aside from software development and management techniques, data security [27][28][29] , data privacy [30][31][32][33][34] , and data complexity [35,36] must also be considered. The complexity of software generally directs to affect the software performances [37][38][39] and the usage resources [40] .…”
Section: Related Workmentioning
confidence: 99%
“…In addition, each group of the indistinguishable quasi-identifier tuples in released datasets is denoted as an equivalence class. Aside from DGH, VGH, and suppression, there are several proposed approaches which can also be used to distort the quasi-identifier values in released datasets to the satisfaction of k-anonymity constraints such as swapped values [25,27,33], the range of values [5], and NDGH [23,26].…”
Section: Related Work K-anonymity [31]mentioning
confidence: 99%
“…To address privacy violation issues in released datasets from using linkage attacks, there are various anonymization models to be proposed such as [19,21,25,27,31,33]. With these anonymization models, aside from removing EI values, the re-identifiable QI values must also be eliminated by using such a suitable approach such as DGH [26,30,31], NDGH [23,26], swapped values [25,27], and the range of values [5]. However, these anonymization models are generally proposed to address privacy violation issues in datasets which are assumed that all attributes must be completed.…”
Section: Definition 2 (Linkage Attack)mentioning
confidence: 99%