Towards internal privacy and flexible K-anonymity

被引:0
|
作者
Hellani, Hussein [1 ]
Kilany, Rima [1 ]
Sokhn, Maria [2 ]
机构
[1] Univ St Joseph, Fac Elect Engn, Beirut, Lebanon
[2] Univ Appl Sci Western Switzerland, Inst Informat Syst, Delemont, Switzerland
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The focus on k-anonymity enhancements along the last decade, allows this method to be elected as the point of start for many anonymization researches. In this paper we propose "Contra-Loss", a novel anonymization approach applied at internal level, to enhance local privacy where data is at rest and "Flexible k-anonymity" which aims to apply k-anonymity in most situations by defining a semantic ontology which distinguishes between scanty and abundant quasi-identifiers to achieve adequate k-blocks.
引用
收藏
页数:2
相关论文
共 50 条
  • [21] Privacy in statistical databases:: K-anonymity through microaggregation
    Domingo-Ferrer, Josep
    Solanas, Agusti
    Martinez-Balleste, Antoni
    2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 774 - +
  • [22] Clustering based k-anonymity algorithm for privacy preservation
    Ni S.
    Xie M.
    Qian Q.
    International Journal of Network Security, 2017, 19 (06) : 1062 - 1071
  • [23] Multi-Level Privacy Preserving K-Anonymity
    Weng, Jui-Hung
    Chi, Po-Wen
    2021 16TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2021), 2021, : 61 - 67
  • [24] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 483 - 490
  • [25] A K-Anonymity Based Schema for Location Privacy Preservation
    Fei, Fan
    Li, Shu
    Dai, Haipeng
    Hu, Chunhua
    Dou, Wanchun
    Ni, Qiang
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (02): : 156 - 167
  • [26] Adaptive k-Anonymity Approach for Privacy Preserving in Cloud
    Karuna Arava
    Sumalatha Lingamgunta
    Arabian Journal for Science and Engineering, 2020, 45 : 2425 - 2432
  • [27] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 312 - 315
  • [28] Towards the diversity of sensitive attributes in k-anonymity
    Wu, Min
    Ye, Xiaojun
    2006 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE AND INTELLIGENT AGENT TECHNOLOGY, WORKSHOPS PROCEEDINGS, 2006, : 98 - +
  • [29] Privacy in manifolds: Combining k-anonymity with differential privacy on Frechet means
    Garg, Sonakshi
    Torra, Vicenc
    COMPUTERS & SECURITY, 2024, 144
  • [30] Privacy Preserving Collaborative Filtering with k-Anonymity through Microaggregation
    Casino, Fran
    Domingo-Ferrer, Josep
    Patsakis, Constantinos
    Puig, Domenec
    Solanas, Agusti
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 490 - 497