2020
DOI: 10.1002/ett.4130
|View full text |Cite
|
Sign up to set email alerts
|

(τ, m)‐slicedBucket privacy model for sequential anonymization for improving privacy and utility

Abstract: In a real-world scenario for privacy-preserving data publishing, the original data is anonymized and released periodically. Each release may vary in number of records due to insert, update, and delete operations. An intruder can combine i.e. correlate different releases to compromise the privacy of the individual records. Most of the literature, such as -safety, -safe (l, k)-diversity, have an inconsistency in record signatures and adds counterfeit tuples with high generalization that causes privacy breach and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 48 publications
(228 reference statements)
0
2
0
Order By: Relevance
“…Regarding anonymization methods or strategies, the generation of counterfeits (i.e., fake records) may imply a significant danger to the utility of the dataset. Searching for a solution without counterfeits that preserves high utility or investigating their necessity and the guarantees that can be only guaranteed with them are naturally two open strands of research of utmost importance, with initial proposals in [41] and [66].…”
Section: Discussion: Recent Advancements and Research Directionsmentioning
confidence: 99%
“…Regarding anonymization methods or strategies, the generation of counterfeits (i.e., fake records) may imply a significant danger to the utility of the dataset. Searching for a solution without counterfeits that preserves high utility or investigating their necessity and the guarantees that can be only guaranteed with them are naturally two open strands of research of utmost importance, with initial proposals in [41] and [66].…”
Section: Discussion: Recent Advancements and Research Directionsmentioning
confidence: 99%
“…For future work considerations, the proposed algorithm can be extended to implement privacy in a dynamic data publishing scenario ( Xiao & Tao, 2007 ; Khan et al., 2020b ) for periodic or non-periodic updates. Similarly, the proposed work can be extended to a cluster based anonymization technique to more efficiently overcome the problem of privacy and utility paradigm ( Safi & Hwang, 2022 ).…”
Section: Discussionmentioning
confidence: 99%
“…Another related work is [18], which propose an alternative implementation of τ -safety that improves utility and privacy by considering non-consecutive reinsertions of tuples. Their main proposal is the creation of a Cach table.…”
Section: M-eligibility Based Algorithmsmentioning
confidence: 99%
“…In continuous data publishing, the main syntactic mechanisms are based on the m-invariance notion [12] and their variations [13], [14], [15], [16], [17], [18]. This notion is deeply related to the m-eligibility property [2], that is, that the dataset has no more than 1 m fraction of tuples with the same sensitive value.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation