Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2014 23rd International Conference on Computer Communication and Networks (ICCCN) 2014
DOI: 10.1109/icccn.2014.6911855
|View full text |Cite
|
Sign up to set email alerts
|

Preserving privacy for sensitive values of individuals in data publishing based on a new additive noise approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…The (α,l)model has less running time and utility loss [30]. An addictive noise approach was proposed by satisfying the conditions of l-diversity [31]. A privacy-preserving data publishing method known as MNSACM was proposed to handle numerical attributes.…”
Section: B 1:1 Micro Data With Multiple Sensitive Attributementioning
confidence: 99%
“…The (α,l)model has less running time and utility loss [30]. An addictive noise approach was proposed by satisfying the conditions of l-diversity [31]. A privacy-preserving data publishing method known as MNSACM was proposed to handle numerical attributes.…”
Section: B 1:1 Micro Data With Multiple Sensitive Attributementioning
confidence: 99%
“…Ref. [ 32 ] proposes a (p+)-sensitive and t-closeness model for MSAs that meets t-closeness requirements for the published table.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Logical operations on fuzzy sets: The fuzzy set theory comprises the operations union, intersection, complement, and inclusion, just like classical set theory. In fuzzy logic, the various logical operations for compound statements in Equation ( 1 ) are considered as implications [ 12 , 32 ]. The implication used in the proposed approach is UNION or AND, which is defined as follows in terms of characteristic functions.…”
Section: Preliminariesmentioning
confidence: 99%
“…To overcome this drawback, Song et al proposed a privacy preservation scheme ensuring that node labels are indistinguishable sufficiently. Furthermore, Zhu et al proposed a new approach to publish anonymous table against the attacker owning publishing algorithm and some individuals' sensitive attribute values. However, some malicious data users can access structure information to re‐identify individuals or speculate about the relationships between two nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Besides, Salary and Personal health are personal sensitive attributes. According to node information, various preservation schemes have been proposed, which mainly hide these attributes. However, the malicious data users can still obtain data providers' privacy from the structure information.…”
Section: Introductionmentioning
confidence: 99%