2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) 2016
DOI: 10.1109/confluence.2016.7508130
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of data security by using anonymization techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Identity disclosure is when an individual can be distinguished from the data being published. And Attribute disclosure is when the new information about any of the individual is released [4]. Identity disclosure allows the Attribute disclosure.…”
Section: A Types Regarding Information Disclosurementioning
confidence: 99%
See 2 more Smart Citations
“…Identity disclosure is when an individual can be distinguished from the data being published. And Attribute disclosure is when the new information about any of the individual is released [4]. Identity disclosure allows the Attribute disclosure.…”
Section: A Types Regarding Information Disclosurementioning
confidence: 99%
“…The identification of the key information is protected when anonymization is performed on data. Some details in the data are confidential which needs to be hidden from the third party and all the threats [4]. Data anonymization declares all the information that is used for queries as well as analysis while it maintains the sensitive data to be kept private Demand of Anonymization of data is because of the increasing occurrences of misuse of personal data and privacy issues [8].…”
Section: Anonymization Of Datamentioning
confidence: 99%
See 1 more Smart Citation
“…Some companies fairly managed to implement data anonymization on a small scale using SQL scripts efficiently to encrypt data [152]. Some other companies have failed after obtaining the best data-masking tool [153]. Anonymization consists of techniques and procedures for data processing, algorithms, keys, and data life cycle.…”
Section: B Privacy and Securitymentioning
confidence: 99%
“…However, these techniques can be applied only on at-rest or visible data i.e. logs, data exports, web pages [152], [153].…”
Section: B Privacy and Securitymentioning
confidence: 99%