2020
DOI: 10.3390/info11030166
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving Data Publishing for Multiple Sensitive Attributes Based on Security Level

Abstract: Privacy preserving data publishing has received considerable attention for publishing useful information while preserving data privacy. The existing privacy preserving data publishing methods for multiple sensitive attributes do not consider the situation that different values of a sensitive attribute may have different sensitivity requirements. To solve this problem, we defined three security levels for different sensitive attribute values that have different sensitivity requirements, and given an L s l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
43
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(43 citation statements)
references
References 41 publications
0
43
0
Order By: Relevance
“…The well‐known “adult” table of the UCI machine learning repository is used in Experiment 1 50 . This table has been used in previous experiments 4,7,8,30‐37,39,40,45,51‐53 . Of the 15 attributes of this table, nine are used by Wang et al 30,31 For Experiment 1, these same nine are selected, namely age , workclass , education , marital‐status , occupation , race , sex , native‐country , and salary‐class , where salary‐class is the sensitive attribute.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The well‐known “adult” table of the UCI machine learning repository is used in Experiment 1 50 . This table has been used in previous experiments 4,7,8,30‐37,39,40,45,51‐53 . Of the 15 attributes of this table, nine are used by Wang et al 30,31 For Experiment 1, these same nine are selected, namely age , workclass , education , marital‐status , occupation , race , sex , native‐country , and salary‐class , where salary‐class is the sensitive attribute.…”
Section: Resultsmentioning
confidence: 99%
“…Budiardjo, Wibowo, and Achsan present another model that distinguishes sensitive from nonsensitive values, albeit with the same demand that each equivalence class have at least k tuples, as well as in the special context of added sensitive attributes 34. Using ‐diversity, Xiao and Li do something similar over attributes having values that are assigned one of three levels of sensitivity 35 . Unlike p‐proportion or (α,k)‐anonymity, Xiao and Li partition a table.…”
Section: Introductionmentioning
confidence: 99%
“…Overlapped slicing method [63] 1 There is no much difference in execution time when compared with existing. Lsl-diversity mode [65]. 1:1 relational dataset, MSA.…”
Section: Pruning Strategies Suppression Techniquesmentioning
confidence: 99%
“…The innovative KCi-slice [ 34 ] is a KC-slice model enhancement with better privacy and utility requirements. The author of [ 35 ] proposed multiple security levels for different SAs values. The proposed method claims more utility, but requires more time to execute.…”
Section: Literature Reviewmentioning
confidence: 99%