2014
DOI: 10.1007/s00779-014-0787-y
|View full text |Cite
|
Sign up to set email alerts
|

Toward inference attacks for k-anonymity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…Therefore, homogeneity attacks are possible when users cloaked together query the same service. This makes it possible for an adversary to link the query to these users [4,25].…”
Section: Homogeneity Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, homogeneity attacks are possible when users cloaked together query the same service. This makes it possible for an adversary to link the query to these users [4,25].…”
Section: Homogeneity Attackmentioning
confidence: 99%
“…The steps will be repeated until the size of S i doesn't change (steps [22][23][24]. The MBR r i covering S i can be a candidate cloaking region (steps [25][26]. Finally, the privacy model δp is calculated.…”
Section: Algorithm Depictionmentioning
confidence: 99%
See 1 more Smart Citation
“…The attackers can use this information to infer the user's travel patterns, hobbies and interests, and other personal privacy information. Location privacy threat refers to, under unauthorized circumstance, the fact that attacker tracks the original position information through location device and technology and infers the privacy information related to user location through reasoning [12]. Location privacy protection method mainly refers to the fact that the user provides false user location privacy information or anonymous user's identity information and location information to the server in the process of location service.…”
Section: Related Workmentioning
confidence: 99%
“…Q-IDs are attributes that contain private information, where adversaries can use to unveil hidden data by linking them to related external elements [7]. Current anonymization algorithms aim to improve data privacy by generalizing the Q-ID attributes through processes that utilize taxonomy tree, interval, or suppression.…”
mentioning
confidence: 99%