2015 Science and Information Conference (SAI) 2015
DOI: 10.1109/sai.2015.7237310
|View full text |Cite
|
Sign up to set email alerts
|

A study of usability-aware network trace anonymization

Abstract: The publication and sharing of network trace data is a critical to the advancement of collaborative research among various entities, both in government, private sector, and academia. However, due to the sensitive and confidential nature of the data involved, entities have to employ various anonymization techniques to meet legal requirements in compliance with confidentiality policies. Nevertheless, the very composition of network trace data makes it a challenge when applying anonymization techniques. On the ot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 25 publications
(47 reference statements)
0
10
0
Order By: Relevance
“…Moreover, these results show that enforcing anonymization procedures following standards lead to a strong reduction of record re-identification. In a study about a hybrid anonymization heuristic [64], Mivule and Anderson aimed towards higher data utility. In the study, the timestamp and Internet Protocol (IP) address were anonymized using distinct methods, and the results demonstrated effective protection against reidentification.…”
Section: A Overview Of Privacy Technologiesmentioning
confidence: 99%
See 4 more Smart Citations
“…Moreover, these results show that enforcing anonymization procedures following standards lead to a strong reduction of record re-identification. In a study about a hybrid anonymization heuristic [64], Mivule and Anderson aimed towards higher data utility. In the study, the timestamp and Internet Protocol (IP) address were anonymized using distinct methods, and the results demonstrated effective protection against reidentification.…”
Section: A Overview Of Privacy Technologiesmentioning
confidence: 99%
“…In a usability awareness study [64], precision degradation is defined as a generalization technique that removes the most precise components of a specific field (e.g., replacing it by 0). With a timestamp, it is possible to have different precision levels (e.g., days, hours, minutes, seconds, and milliseconds).…”
Section: B Suppressive Anonymization Mechanismsmentioning
confidence: 99%
See 3 more Smart Citations