2021
DOI: 10.1007/978-3-030-68154-8_79
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Violation Issues in Re-publication of Modification Datasets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…For this reason, software development and management techniques are in place to ensure efficient operations across the software. Aside from software development and management techniques, data security [27][28][29] , data privacy [30][31][32][33][34] , and data complexity [35,36] must also be considered. The complexity of software generally directs to affect the software performances [37][38][39] and the usage resources [40] .…”
Section: Related Workmentioning
confidence: 99%
“…For this reason, software development and management techniques are in place to ensure efficient operations across the software. Aside from software development and management techniques, data security [27][28][29] , data privacy [30][31][32][33][34] , and data complexity [35,36] must also be considered. The complexity of software generally directs to affect the software performances [37][38][39] and the usage resources [40] .…”
Section: Related Workmentioning
confidence: 99%
“…For this reason, a challenge of data utilization is when datasets are utilized in big data analytics or shared with the outside scope of data collecting organizations, it is how to balance data utility and data privacy because they are traded-off. To achieve these aims in datasets, there are several well-known privacy preservation models to be proposed such as data anonymization models [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44], data anatomization models [45] [46] [47] [48], and aggregate query frameworks [49]. Moreover, we further see that some privacy preservation models have been proposed, they are based on data anonymization in conjunction with aggregate query frameworks such as k-Likeness [50] and (l p1 , .…”
Section: Introductionmentioning
confidence: 99%
“…For this reason, balancing the data utility and the data privacy is a challenge in datasets when datasets are released and provided to the data analyst. To achieve data utility and data privacy, there are several well-known privacy preservation models to be proposed, i.e., data anonymization models [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44], data anatomization models [45] [46] [47] [48], and aggregate query frameworks [49]. In addition, some privacy preservation models are based on data anonymization in conjunction with aggregate query frameworks such as k-Likeness [50] and (l p1 , .…”
Section: Introductionmentioning
confidence: 99%