2021
DOI: 10.1155/2021/7154705
|View full text |Cite
|
Sign up to set email alerts
|

Quasi-Identifier Recognition Algorithm for Privacy Preservation of Cloud Data Based on Risk Reidentification

Abstract: Cloud computing plays an essential role as a source for outsourcing data to perform mining operations or other data processing, especially for data owners who do not have sufficient resources or experience to execute data mining techniques. However, the privacy of outsourced data is a serious concern. Most data owners are using anonymization-based techniques to prevent identity and attribute disclosures to avoid privacy leakage before outsourced data for mining over the cloud. In addition, data collection and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 44 publications
(53 reference statements)
0
2
0
Order By: Relevance
“…Thus, the space length of the target and the exploring agent is reduced by the renovated as well as derived proposed Equation ( 13) which is simplified from the steps shown in Equations ( 11) and (12). In addition to the search divergence, the best solution of the search agent in the previous iteration with the movement velocity of the search agent is considered.…”
Section: Position Renovation Based On Swirlingmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, the space length of the target and the exploring agent is reduced by the renovated as well as derived proposed Equation ( 13) which is simplified from the steps shown in Equations ( 11) and (12). In addition to the search divergence, the best solution of the search agent in the previous iteration with the movement velocity of the search agent is considered.…”
Section: Position Renovation Based On Swirlingmentioning
confidence: 99%
“…Mansour et al 12 introduced a modern quasi‐identifier recognition algorithm for reducing the disclosure identification which results from the quasi‐identifier linking. The two main stages involved in the developed algorithm are the classification of attributes and the identification of the QID dimension.…”
Section: Literature Reviewmentioning
confidence: 99%