2006
DOI: 10.1007/11844662_4
|View full text |Cite
|
Sign up to set email alerts
|

Secure Anonymization for Incremental Datasets

Abstract: Abstract. Data anonymization techniques based on the k-anonymity model have been the focus of intense research in the last few years. Although the k-anonymity model and the related techniques provide valuable solutions to data privacy, current solutions are limited only to static data release (i.e., the entire dataset is assumed to be available at the time of release). While this may be acceptable in some applications, today we see databases continuously growing everyday and even every hour. In such dynamic en… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
129
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 142 publications
(137 citation statements)
references
References 23 publications
0
129
0
Order By: Relevance
“…These research works can be classified into serial data publishing on a dynamic dataset and serial data publishing on a static dataset. Most of the works focus on the cases for a dynamic dataset (or multiple instances of data), which includes an incremental dataset [4][5] (i.e. allowing insertions of new tuples), a dataset with insertions and deletions [6], a dataset with insertions, deletions, and updates [7], a dataset with sensitive values that change over time [8].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…These research works can be classified into serial data publishing on a dynamic dataset and serial data publishing on a static dataset. Most of the works focus on the cases for a dynamic dataset (or multiple instances of data), which includes an incremental dataset [4][5] (i.e. allowing insertions of new tuples), a dataset with insertions and deletions [6], a dataset with insertions, deletions, and updates [7], a dataset with sensitive values that change over time [8].…”
Section: Related Workmentioning
confidence: 99%
“…can be expressed as an expression containing terms that can be calculated by simple counting on the published tables (such an expression is the general case for Equation (4). By the definition of conditional probability, it can be expressed as…”
Section: Without Knowing the Quasi-identifier Attribute Correlationmentioning
confidence: 99%
See 1 more Smart Citation
“…Fusion techniques have also been considered in privacypreserving data re-publishing, and for analyzing knowledge merged from sequential releases of data [15], [16]. To the best of our knowledge, fusion of data mining results has not been considered before in data privacy research.…”
Section: B Related Workmentioning
confidence: 99%
“…Motivations In this paper, we consider temporal data of the form D [1], D [2], …, where each D[i] is the snapshot containing the records collected at the time instance i. Examples of temporal data include sensor data, Internet traffic, financial tickers, web logs, fraudulent credit card transaction detection, network intrusion detection, financial record auditing, and telephone call records, inpatient discharge data, criminal reports, and population based disease monitoring data.…”
mentioning
confidence: 99%