2007
DOI: 10.1007/s00778-006-0039-5
|View full text |Cite
|
Sign up to set email alerts
|

Providing k-anonymity in data mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
60
0
1

Year Published

2008
2008
2021
2021

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 104 publications
(61 citation statements)
references
References 27 publications
0
60
0
1
Order By: Relevance
“…These methods transform the dataset into k indistinguishable records from each other. Mostly, k-anonymity concept is employed by the PPDM algorithms so as to assure privacy [5]. But this method is not suitable for high dimensional data and to search out optimal k-anonymous datasets over generalization and is esteemed as NP-Hard [6] [7].…”
Section: Literature Reviewmentioning
confidence: 99%
“…These methods transform the dataset into k indistinguishable records from each other. Mostly, k-anonymity concept is employed by the PPDM algorithms so as to assure privacy [5]. But this method is not suitable for high dimensional data and to search out optimal k-anonymous datasets over generalization and is esteemed as NP-Hard [6] [7].…”
Section: Literature Reviewmentioning
confidence: 99%
“…One of the advantages of generalization over other disclosure limitation techniques is that it preserves the truthfulness of the information. However, a major drawback of existing generalization techniques is that domain hierarchy trees are required for every quasiidentifier attribute on which k-anonymity is to be applied [4], [5], [6], [7], [8], [9], [10]. These domain hierarchy trees are generated manually by the user before applying the generalization process.…”
Section: Related Workmentioning
confidence: 99%
“…This section presents the results of various issues that were examined in regard to the proposed algorithm: (1) verification of the proposed hybrid approach for achieving k-anonymity without reasonable loss of classification accuracy; (2) comparison of kACTUS-2 with TDS, TDR and kADET algorithms presented in [6], [9] and [10] in terms of classification accuracy, information loss and statistical significance; (3) comparison of kACTUS-2 with former algorithm kACTUS in terms of classification accuracy, information loss, statistical significance and data loss.…”
Section: Experimental Evaluationmentioning
confidence: 99%
“…In the proposed K-anonymity method, CBK(L,K)-anonymity algorithm is used to solve the problem of privacy information leakage in data publishing.The main idea is anonymizing the data set by K-clustering based on influence matrix of background knowledge, it can make anonymous data effectively resist background knowledge attack and homogeneity attack, and can solve diversity of sensitive attribute. [6]. …”
Section: B K-anonymity Clustering Methods For Effective Data Privacy mentioning
confidence: 99%