2020
DOI: 10.1109/tsc.2019.2963309
|View full text |Cite
|
Sign up to set email alerts
|

Privacy in Data Service Composition

Abstract: In modern information systems different information features, about the same individual, are often collected and managed by autonomous data collection services that may have different privacy policies. Answering many end-users' legitimate queries requires the integration of data from multiple such services. However, data integration is often hindered by the lack of a trusted entity, often called a mediator, with which the services can share their data and delegate the enforcement of their privacy policies. In … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(16 citation statements)
references
References 35 publications
0
16
0
Order By: Relevance
“…Intermediate data is shared with the mediator in a secure manner such that the mediator can orchestrate the data composition plan, perform join operations on the collected data without seeing the data. M. Barhamgi et.al [14] do something similar but the big limitation of their work is that the privacy critical attributes need not to be numerical. In this paper, we overcome this limitation and ensure privacy irrespective of the type of the privacy critical attribute.…”
Section: Proposed Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…Intermediate data is shared with the mediator in a secure manner such that the mediator can orchestrate the data composition plan, perform join operations on the collected data without seeing the data. M. Barhamgi et.al [14] do something similar but the big limitation of their work is that the privacy critical attributes need not to be numerical. In this paper, we overcome this limitation and ensure privacy irrespective of the type of the privacy critical attribute.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…In this paper, we overcome this limitation and ensure privacy irrespective of the type of the privacy critical attribute. Like [14], K-Anonymity is used for value generalization to preserve the privacy of data service providers during data service composition. We specifically utilise the "Datasetbased identifier generalization" method discussed in [14] for value generalization using K-Anonymity.…”
Section: Proposed Methodsmentioning
confidence: 99%
See 3 more Smart Citations