2020
DOI: 10.1016/j.eswa.2019.113086
|View full text |Cite
|
Sign up to set email alerts
|

Mathematically optimized, recursive prepartitioning strategies for k-anonymous microaggregation of large-scale datasets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 47 publications
0
5
0
Order By: Relevance
“…Due to such demanding requirements, privacy related data are overshadowed. Thus, the perspective of privacy, we feel that any improvement in preserving data utility without a price in (computing) is not negligible and some are currently being purposed in this direction [43,35].…”
Section: Discussion On Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to such demanding requirements, privacy related data are overshadowed. Thus, the perspective of privacy, we feel that any improvement in preserving data utility without a price in (computing) is not negligible and some are currently being purposed in this direction [43,35].…”
Section: Discussion On Resultsmentioning
confidence: 99%
“…If protection mechanisms cannot cope with the (sometimes real-time) requirements of modern applications, they render unusable no matter how much utility is preserved. A few works have been proposed recently in this direction [35,42].…”
Section: Introductionmentioning
confidence: 99%
“…They also proposed several strategies to simplify the distance calculations and element sorting operations for data microaggregation 23 . Pallarès et al proposed an optimized prepartitioning strategy to reduce the running time of K -anonymous microaggregation on large datasets 24 .…”
Section: Related Workmentioning
confidence: 99%
“…Recent works have shown to follow similar approaches, harnessing known mechanisms from different domains (e.g., machine learning), aiming to increase the efficiency of privacy protection algorithms, not only in terms of runtime [12,13,14,15], but also in terms of resulting data utility. For instance, [16] developed an efficient clustering mechanism to deal with large databases while preserving the data utility through a partitioning method of a modified minimum spanning tree.…”
Section: Related Work and Impact Of This Approachmentioning
confidence: 99%
“…The evaluation of the computational performance of our methods has been conducted with three standardized data sets. These real data sets include "Large Census", "Quant Forest" and "USA House", which were previously used in [49,12]. The "Large Census" data set has 149,642 records and includes 13 numerical attributes; "Quant Forest" has 581,012 records, from which we use a random sample of 150,000 records, and 10 numerical attributes.…”
Section: Evaluation Criteria and Data Setsmentioning
confidence: 99%