A Privacy-Aware Access Model on Anonymized Data

被引:0
|
作者
Huang, Xuezhen [1 ]
Liu, Jiqiang [1 ]
Han, Zhen [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
来源
关键词
Privacy; Data security; Access control; Anonymity; K-ANONYMITY;
D O I
10.1007/978-3-319-27998-5_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With development of information technology and communication, corporations and individuals will collect some digital information to support information-based decisions. However, under some conditions, if all original data are released, some privacy will be disclosed, which will threaten data security and data privacy. Therefore, data owners will take some security measures. Role-based access control may authorize related original data accessed by users according to their roles. Privacy-preserving technology release processed data to avoid privacy disclosure. Nevertheless, existing privacy-preserving technologies lack continuity and are quite inefficient. This paper establishes an access model about on anonymized data and combines with the foregoing two security measures. On the premise that data security and data privacy are ensured, there is more flexibility and diversity and work efficiency is improved as well.
引用
收藏
页码:201 / 212
页数:12
相关论文
共 50 条
  • [1] A privacy-aware access control system
    Ardagna, C.
    Cremonini, M.
    di Vimercati, S.
    Samarati, P.
    [J]. JOURNAL OF COMPUTER SECURITY, 2008, 16 (04) : 369 - 397
  • [2] A privacy-aware access control model for distributed network monitoring
    Papagiannakopoulou, Eugenia I.
    Koukovini, Maria N.
    Lioudakis, Georgios V.
    Garcia-Alfaro, Joaquin
    Kaklamani, Dimitra I.
    Venieris, Iakovos S.
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (07) : 2263 - 2281
  • [3] Privacy query rewriting algorithm instrumented by a privacy-aware access control model
    Said Oulmakhzoune
    Nora Cuppens-Boulahia
    Frédéric Cuppens
    Stéphane Morucci
    Mahmoud Barhamgi
    Djamal Benslimane
    [J]. annals of telecommunications - annales des télécommunications, 2014, 69 : 3 - 19
  • [4] Privacy query rewriting algorithm instrumented by a privacy-aware access control model
    Oulmakhzoune, Said
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Morucci, Stephane
    Barhamgi, Mahmoud
    Benslimane, Djamal
    [J]. ANNALS OF TELECOMMUNICATIONS, 2014, 69 (1-2) : 3 - 19
  • [5] Privacy-Aware Data Trading
    Wang, Shengling
    Shi, Lina
    Hu, Qin
    Zhang, Junshan
    Cheng, Xiuzhen
    Yu, Jiguo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3916 - 3927
  • [6] A Privacy-Aware Conceptual Model for Handling Personal Data
    Antignac, Thibaud
    Scandariato, Riccardo
    Schneider, Gerardo
    [J]. LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: FOUNDATIONAL TECHNIQUES, PT I, 2016, 9952 : 942 - 957
  • [7] Creating a Privacy-aware framework for fine-grained Data Access
    Salant, Eliot
    [J]. ERCIM NEWS, 2023, (133): : 16 - 17
  • [8] Privacy-aware access control for video data in intelligent surveillance systems
    Vagts, Hauke
    Jakoby, Andreas
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2012, 2012, 8406
  • [9] Privacy-aware Role Based Access Control
    Ni, Qun
    Trombetta, Alberto
    Bertino, Elisa
    Lobo, Jorge
    [J]. SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 41 - 50
  • [10] Agora: A Privacy-aware Data Marketplace
    Koutsos, Vlasis
    Papadopoulos, Dimitrios
    Chatzopoulos, Dimitris
    Tarkoma, Sasu
    Hui, Pan
    [J]. 2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, : 1211 - 1212