2018 Second International Conference on Computing Methodologies and Communication (ICCMC) 2018
DOI: 10.1109/iccmc.2018.8487483
|View full text |Cite
|
Sign up to set email alerts
|

Multiple Sensitive Attributes Based Privacy Preserving Data Publishing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…In literature, various privacy preservation approaches have been proposed for the trajectory data with single sensitive attributes, such as Generalization, Perturbation, Clustering, Differential Privacy, and Suppression, to defend against the various linkage attacks [12] [13]. Similarly, Multi-sensitive Bucketization, (p,k) -Angelization, and Generalization are the approaches to preserve the privacy of the multiple sensitive attributes along with the Quasi Identifiers but not with trajectory data.…”
Section: Introductionmentioning
confidence: 99%
“…In literature, various privacy preservation approaches have been proposed for the trajectory data with single sensitive attributes, such as Generalization, Perturbation, Clustering, Differential Privacy, and Suppression, to defend against the various linkage attacks [12] [13]. Similarly, Multi-sensitive Bucketization, (p,k) -Angelization, and Generalization are the approaches to preserve the privacy of the multiple sensitive attributes along with the Quasi Identifiers but not with trajectory data.…”
Section: Introductionmentioning
confidence: 99%