2009
DOI: 10.1561/1900000008
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Data Publishing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
46
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 122 publications
(46 citation statements)
references
References 0 publications
0
46
0
Order By: Relevance
“…12 Therefore, in practice, the implementation of a PPRL protocol has to rely on the enforcement of the corresponding jurisdiction. Composition attacks have been defined by Ganta et al (2008) as attacks, in which an adversary uses independent anonymized releases to breach privacy (for a textbook example with hospital data, see Chen et al 2009). These kind of attacks have received little attention in the PPRL literature, since most protocols minimize the amount of information available for an attacker.…”
Section: Collusionmentioning
confidence: 99%
“…12 Therefore, in practice, the implementation of a PPRL protocol has to rely on the enforcement of the corresponding jurisdiction. Composition attacks have been defined by Ganta et al (2008) as attacks, in which an adversary uses independent anonymized releases to breach privacy (for a textbook example with hospital data, see Chen et al 2009). These kind of attacks have received little attention in the PPRL literature, since most protocols minimize the amount of information available for an attacker.…”
Section: Collusionmentioning
confidence: 99%
“…While this may be sufficient for many simple analyses, it may not guarantee that the identity of individuals cannot be revealed from anonymized datasets. Substantial research has been and is currently being performed in the database community on privacy preserving data mining, reflecting the importance of this subject [93][94][95][96][97] (for a comprehensive state-of-the-art summary see the "Privacy-Preserving Data Publishing" survey [98]). Nevertheless, there are still a number of open problems, and many approaches are standing next to each other, lacking user-friendliness, integration, and a consequent systemic approach.…”
Section: Anonymization and Randomizationmentioning
confidence: 99%
“…There are commonly two methods like generalization and suppression mainly used to protect the privacy preservation in data mining. Bee-Chung Chen in [13] demonstrated that releasing a data table by simply removing identifiers (e.g., names and social security numbers) can seriously breach the privacy of individuals whose data are in the table. There are two attacks in k-anonymity.…”
Section: K-anonymitymentioning
confidence: 99%