2016
DOI: 10.4018/ijisp.2016010101
|View full text |Cite
|
Sign up to set email alerts
|

Combination of Access Control and De-Identification for Privacy Preserving in Big Data

Abstract: Despite of its emergence and advantages in various domains, big data still suffers from major disadvantages. Timeless, scalability, and privacy are the main problems that hinder the advance of big data. Privacy preserving has become a wide search era within the scientific community. This paper covers the problem of privacy preserving over big data by combining both access control and data de-identification techniques in order to provide a powerful system. The aim of this system is to carry on all big data prop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 38 publications
(34 reference statements)
0
3
0
Order By: Relevance
“…Approaches Techniques Integrity Confidentiality Credibility Generalization K-anonymity based on generalization [22], [23], [24], [25] No No Yes L-diversity [2], [14], [23], [25] Yes No Yes T-closeness [2], [14], [26] Yes Yes Yes Randomization K-anonymity based on suppression [20], [24], [27] No No Yes…”
Section: Table 1 the Evaluation Of Non-cryptographic Anonymization Te...mentioning
confidence: 99%
See 2 more Smart Citations
“…Approaches Techniques Integrity Confidentiality Credibility Generalization K-anonymity based on generalization [22], [23], [24], [25] No No Yes L-diversity [2], [14], [23], [25] Yes No Yes T-closeness [2], [14], [26] Yes Yes Yes Randomization K-anonymity based on suppression [20], [24], [27] No No Yes…”
Section: Table 1 the Evaluation Of Non-cryptographic Anonymization Te...mentioning
confidence: 99%
“…In addition, it is impossible to implement the inference attacks against an 'l-diverse' data set with certitude of 100% [14]. In the literature, there exist three models of l-diversity which are Distinct, Entropy and Recursive models [24], [26]. However, the distinct l-diversity technique is the most used where each bucket in the data set contains only distinct values.…”
Section: L-diversitymentioning
confidence: 99%
See 1 more Smart Citation