Robustness of k-Anonymization Model in Compliance with General Data Protection Regulation

被引:0
|
作者
Abubakar, Ibrahim Bio [1 ]
Yagnik, Tarjana [1 ]
Mohammed, Kabiru [1 ]
机构
[1] Engineering and Media de Montfort University, Department of Computing, Leicester, United Kingdom
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Internet of things - Risk assessment
引用
收藏
页码:67 / 72
相关论文
共 50 条
  • [1] NESTGate Realizing Personal Data Protection with k-Anonymization Technology
    Morisawa, Yoshihiro
    Matsune, Shinji
    [J]. FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2016, 52 (03): : 37 - 42
  • [2] Data privacy through optimal k-anonymization
    Bayardo, RJ
    Agrawal, R
    [J]. ICDE 2005: 21ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2005, : 217 - 228
  • [3] MAGE: A semantics retaining K-anonymization method for mixed data
    Han, Jianmin
    Yu, Juan
    Mo, Yuchang
    Lu, Jianfeng
    Liu, Huawen
    [J]. KNOWLEDGE-BASED SYSTEMS, 2014, 55 : 75 - 86
  • [4] The DAta Protection REgulation COmpliance Model
    Ruoti, Scott
    Seamons, Kent
    [J]. IEEE SECURITY & PRIVACY, 2019, 17 (06) : 72 - 76
  • [5] The DAta Protection REgulation COmpliance Model
    Bartolini C.
    Lenzini G.
    Robaldo L.
    [J]. IEEE Security and Privacy, 2019, 17 (06): : 37 - 45
  • [6] Achieving High Data Utility K-Anonymization Using Similarity-Based Clustering Model
    Sarrafi Aghdam, Mohammad Rasool
    Sonehara, Noboru
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (08): : 2069 - 2078
  • [7] Automated k-Anonymization and l-Diversity for Shared Data Privacy
    Kayem, Anne V. D. M.
    Vester, C. T.
    Meinel, Christoph
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2016, PT I, 2016, 9827 : 105 - 120
  • [8] Utility-Driven k-Anonymization of Public Transport User Data
    Bhati, Bhawani Shanker
    Ivanchev, Jordan
    Bojic, Iva
    Datta, Anwitaman
    Eckhoff, David
    [J]. IEEE ACCESS, 2021, 9 : 23608 - 23623
  • [9] The Metaverse: searching for compliance with the General Data Protection Regulation
    Xynogalas, Vasilis
    Leiser , M. R.
    [J]. INTERNATIONAL DATA PRIVACY LAW, 2024, 14 (02) : 89 - 105
  • [10] K-Anonymization approach for privacy preservation using data perturbation techniques in data mining
    Kiran, Ajmeera
    Shirisha, N.
    [J]. MATERIALS TODAY-PROCEEDINGS, 2022, 64 : 578 - 584