2022
DOI: 10.37936/ecti-cit.2022163.246469
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Threats and Privacy Preservation Techniques for Farmer Data Collections Based on Data Shuffling

Abstract: Aside from smart technologies, farm data collection is also important for smart farms including farm environment data collection and farmer survey data collection. With farm data collection, we observe that it is generally proposed to utilize in smart farm systems. However, it can also be released for use in the outside scope of the data collecting organization for an appropriate business reason such as improving the smart farm system, product quality, and customer service. Moreover, we can observe that the fa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…From the experimental results that are shown in Figures 5,6,7,8,9, and 10, we can see that the number of sensitive attributes and the value of l is more effective to the data utility in datasets than the number of quasi-identifier attributes because the privacy preservation constraint of the proposed model and the compared models is based on the number of the distinct sensitive values.…”
Section: • the Second Experimental Dataset Just Containsmentioning
confidence: 98%
“…From the experimental results that are shown in Figures 5,6,7,8,9, and 10, we can see that the number of sensitive attributes and the value of l is more effective to the data utility in datasets than the number of quasi-identifier attributes because the privacy preservation constraint of the proposed model and the compared models is based on the number of the distinct sensitive values.…”
Section: • the Second Experimental Dataset Just Containsmentioning
confidence: 98%
“…To rid the vulnerabilities of data anonymization, data anatomization [45] [46] [47] [48] was proposed. For privacy preservation, all explicit identifiers of users are removed.…”
Section: Data Anatomization [45]mentioning
confidence: 99%
“…Observation 5 (Data anatomization) Although privacy preservation based on data anatomization is efficient and effective than data anonymization, we cannot deny that privacy preservation based on data anatomization still has some data utility issues that must be addressed. Moreover, privacy preservation based on data anatomization further has disorganized issues [48] that must be addressed when the number of sensitive attributes is increased.…”
Section: Data Anatomization [45]mentioning
confidence: 99%
See 1 more Smart Citation
“…Privacy violation is a serious issue that the data holder must consider when datasets are released to utilize in the outside scope of data-collecting organizations [1], i.e., the data holder must ensure that when the datasets are released, they must not have any concern of privacy violation issues. To achieve these aims in released datasets, k-anonymity is proposed.…”
Section: Introductionmentioning
confidence: 99%