Towards internal privacy and flexible K-anonymity

被引:0
|
作者
Hellani, Hussein [1 ]
Kilany, Rima [1 ]
Sokhn, Maria [2 ]
机构
[1] Univ St Joseph, Fac Elect Engn, Beirut, Lebanon
[2] Univ Appl Sci Western Switzerland, Inst Informat Syst, Delemont, Switzerland
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The focus on k-anonymity enhancements along the last decade, allows this method to be elected as the point of start for many anonymization researches. In this paper we propose "Contra-Loss", a novel anonymization approach applied at internal level, to enhance local privacy where data is at rest and "Flexible k-anonymity" which aims to apply k-anonymity in most situations by defining a semantic ontology which distinguishes between scanty and abundant quasi-identifiers to achieve adequate k-blocks.
引用
收藏
页数:2
相关论文
共 50 条
  • [1] Towards Flexible K-Anonymity
    Kilany, Rima
    Sokhn, Maria
    Hellani, Hussein
    Shabani, Shaban
    KNOWLEDGE ENGINEERING AND SEMANTIC WEB, KESW 2016, 2016, 649 : 288 - 297
  • [2] Towards a Privacy Diagnosis Centre: Measuring k-anonymity
    Mirakabad, Mohammad Reza Zare
    Jantan, Aman
    Bressan, Stephane
    CSA 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND ITS APPLICATIONS, PROCEEDINGS, 2008, : 102 - +
  • [3] -diversity: Privacy beyond k-anonymity
    Cornell University
    不详
    ACM Trans. Knowl. Discov. Data, 2007, 1
  • [4] k-anonymity:: A model for protecting privacy
    Sweeney, L
    INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) : 557 - 570
  • [5] Protecting privacy using k-anonymity
    El Emam, Khaled
    Dankar, Fida Kamal
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2008, 15 (05) : 627 - 637
  • [6] A Distributed k-Anonymity Protocol for Location Privacy
    Zhong, Ge
    Hengartner, Urs
    2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 253 - 262
  • [7] Data privacy preservation algorithm with k-anonymity
    Waranya Mahanan
    W. Art Chaovalitwongse
    Juggapong Natwichai
    World Wide Web, 2021, 24 : 1551 - 1561
  • [8] A personalized k-anonymity privacy preserving method
    Xu, Yong
    Qin, Xiaolin
    Yang, Zhongxue
    Yang, Yitao
    Li, Kun
    Journal of Information and Computational Science, 2013, 10 (01): : 139 - 155
  • [9] Privacy in VoIP Networks: A k-Anonymity Approach
    Srivatsa, Mudhakar
    Iyengar, Arun
    Liu, Ling
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2856 - 2860
  • [10] Research on K-Anonymity Algorithm in Privacy Protection
    Wang, Chen
    Liu, Lianzhong
    Gao, Lijie
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 194 - 196