2021
DOI: 10.1109/tdsc.2019.2919833
|View full text |Cite
|
Sign up to set email alerts
|

Sensitive Label Privacy Preservation with Anatomization for Data Publishing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 42 publications
0
12
0
Order By: Relevance
“…In the table division procedure, the meansquare contingency coefficient and entropy have been adopted for anonymization. In group division, nonoverlapping groups have been framed to satisfy the (α,β,γ,δ) model [29].…”
Section: A 1:1 Micro Data With Single Sensitive Attributementioning
confidence: 99%
“…In the table division procedure, the meansquare contingency coefficient and entropy have been adopted for anonymization. In group division, nonoverlapping groups have been framed to satisfy the (α,β,γ,δ) model [29].…”
Section: A 1:1 Micro Data With Single Sensitive Attributementioning
confidence: 99%
“…Anatomisation . The goal of Anatomisation is to de‐link the association among attributes without modifying their values [19]. Xiao et al.…”
Section: Related Workmentioning
confidence: 99%
“…As a primary anonymization technique for privacy-preserving data publishing, bucketization partitions datasets into non-overlapped subsets to de-link the relation between attributes without modifying published data [32]. Anatomy [33] is the first proposed bucketization technique to protect sensitive information in relational datasets, where quasiidentifiers and sensitive values are first separated into two tables, and each table is divided into buckets.…”
Section: On Bucketization Techniquementioning
confidence: 99%
“…Based on anatomy, Liu et al [16] design a linear time algorithm for the l-diverse dataset in the published social graph. A relational data anonymization scheme using anatomization, called SLPPA [32], performs the table and group divisions to achieve the (α, β, γ, δ)-privacy requirement. Slicing [36] is another bucketization-based approach that first vertically partitions attributes into columns and then horizontally divides tuples into buckets to meet l-diversity.…”
Section: On Bucketization Techniquementioning
confidence: 99%
See 1 more Smart Citation