2018 IEEE 34th International Conference on Data Engineering (ICDE) 2018
DOI: 10.1109/icde.2018.00171
|View full text |Cite
|
Sign up to set email alerts
|

PRIMA: An End-to-End Framework for Privacy at Scale

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(17 citation statements)
references
References 17 publications
0
17
0
Order By: Relevance
“…However, their approach does not address the potential memory exhaustion unable to accommodate increasing number of intermediate data produced as the number of iteration increases. PRIMA [16] proposes an anonymization strategy for Mondrian algorithm with Optimal Lattice Anonymization (OLA) which is used to define the utility and generalization level rules in order to limit the data utility loss. Reference [22] proposes a distributed Mondrian approach by splitting the input data to the partitions allocated to each node of cluster by using Spark k-mean.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, their approach does not address the potential memory exhaustion unable to accommodate increasing number of intermediate data produced as the number of iteration increases. PRIMA [16] proposes an anonymization strategy for Mondrian algorithm with Optimal Lattice Anonymization (OLA) which is used to define the utility and generalization level rules in order to limit the data utility loss. Reference [22] proposes a distributed Mondrian approach by splitting the input data to the partitions allocated to each node of cluster by using Spark k-mean.…”
Section: Related Workmentioning
confidence: 99%
“…Spark has extended its scalability aspect in addition to offering a new set of advanced features more suited for the algorithms dealing with many different types of big data operations [14]. With the surge in the population of Spark and shift from MapReduce approach, many Spark-based data anonymization techniques have been proposed [15][16][17][18][19]. However, these existing proposals often tend to focus their efforts on improving and readdressing the scalability aspects to be more suited for Spark instead of investigating the suitability of Spark as a platform of choice for data anonymization techniques.…”
Section: Introductionmentioning
confidence: 99%
“…Ethical data sharing requires transforming data via aggregation or other means to ensure that it is no longer identifiable at a level that jeopardizes privacy and cannot by “deanonymized” when combined with other data sets (Helveston, ; Wu, ). All anonymization techniques will inherently cause a loss in the information content and utility of the data (Antonatos et al, ). To minimize the effect of this loss and meet FAIR standards, it is critical to also include detailed information about the anonymization procedure via metadata and sharing code, ideally using open‐source tools integrating version control for transparency, to allow for interoperability and usability by other researchers (Bakker, ; Lowndes et al, ; Stagge et al, ).…”
Section: Addressing Privacy Concerns With Open and Ethical Data Managmentioning
confidence: 99%
“…Ethical data sharing requires transforming data via aggregation or other means to ensure that it is no longer identifiable at a level that jeopardizes privacy and cannot by 'de-anonymized' when combined with other datasets (Helveston, 2015;Wu, 2013). All anonymization techniques will inherently cause a loss in the information content and utility of the data (Antonatos et al, 2018).…”
Section: Sharing Private Datamentioning
confidence: 99%