Privacy-preserving tabular data publishing: A comprehensive evaluation from web to cloud

被引:21
作者
Abdelhameed, Saad A. [1 ]
Moussa, Sherin M. [2 ]
Khalifa, Mohamed E. [1 ]
机构
[1] ECU, Fac Engn & Technol, Cairo 11351, Egypt
[2] Ain Shams Univ, Fac Comp & Informat Sci, Cairo 11566, Egypt
关键词
Data privacy; Privacy-preserving data publishing; Data anonymization; Data streams; Multiple sensitive attributes; Single sensitive attribute; BIG DATA; K-ANONYMITY; PRESERVATION; FRAMEWORK; SECURITY; MODEL;
D O I
10.1016/j.cose.2017.09.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The amount of data collected by various organizations about individuals is continuously increasing. This includes diverse data sources often for data of high dimensionality. Most of these data are stored in tabular format and can include sensitive content. Preserving data privacy is an essential task in order to allow such data to be published for different research and analysis purposes. In this context, Privacy-Preserving Tabular Data Publishing (PPTDP) has drawn considerable attention, where different approaches have been proposed to preserve the privacy of individuals' tabular data. Such data can include Single Sensitive Attributes (SSA) or Multiple Sensitive Attributes (MSA) or come from data streams. In this paper, we conduct a comprehensive study to analyze and evaluate the main different data anonymization approaches that have been introduced in PPTDP. The study investigates the three broad areas of research: SSA, MSA and data streams. A detailed criticism is presented to highlight the strengths and the weaknesses of each approach including their deployment in the cloud and Internet of Things (IoT) environments. A research gap analysis is discussed with a focus on capturing current state of the art in this field in order to highlight the future directions that can be considered. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:74 / 95
页数:22
相关论文
共 104 条
[1]  
Aggarwal CC, 2004, LECT NOTES COMPUT SC, V2992, P183
[2]  
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[3]  
[Anonymous], 2006, ICALP
[4]  
[Anonymous], 2006, P 32 INT C VER LARG
[5]  
[Anonymous], IEEE T KNOWL DATA EN
[6]  
[Anonymous], IEEE COMPUTER SOC
[7]  
[Anonymous], 2004, Information Security Technical Report, DOI DOI 10.1016/S1363-4127(04)00014-7
[8]  
[Anonymous], 2015, INT C COMP COMM INF, DOI DOI 10.1109/ICCCI.2015.7218095
[9]  
[Anonymous], INT J EMERG RES MANA
[10]  
[Anonymous], CHIN J COMPUT