Proceedings of the 13th International Joint Conference on E-Business and Telecommunications 2016
DOI: 10.5220/0005963804110418
|View full text |Cite
|
Sign up to set email alerts
|

Towards Practical k-Anonymization: Correlation-based Construction of Generalization Hierarchy

Abstract: The privacy of individuals included in the datasets must be preserved when sensitive datasets are published. Anonymization algorithms such as k-anonymization have been proposed in order to reduce the risk of individuals in the dataset being identified. k-anonymization is the most common technique of modifying attribute values in a dataset until at least k identical records are generated. There are many algorithms that can be used to achieve k-anonymity. However, existing algorithms have the problem of informat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Tomoaki et al proposed a k-anonymization algorithm to anonymize the data set by analyzing the correlation between attributes and generates an optimal hierarchy based on this correlation. This method thus guarantees the protection of privacy [7].…”
Section: Related Workmentioning
confidence: 91%
See 1 more Smart Citation
“…Tomoaki et al proposed a k-anonymization algorithm to anonymize the data set by analyzing the correlation between attributes and generates an optimal hierarchy based on this correlation. This method thus guarantees the protection of privacy [7].…”
Section: Related Workmentioning
confidence: 91%
“…Secondly, data confidentiality must be ensured by setting up an access control system to prevent intruders from gaining access to information in the system. In addition, we explore the importance of privacy-protecting techniques in improving the confidentiality of exam data, such as anonymization and pseudonymization [7]. As this type of system is often exposed to brute force attack in order to make the services unavailable, we suggest to set up decentralized architecture [8] and dispatch the services in multiple nodes.…”
Section: Introductionmentioning
confidence: 99%