4.6 Article

Efficiently Supporting Online Privacy-Preserving Data Publishing in a Distributed Computing Environment

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Locally Differentially Private Heavy Hitter Identification

Tianhao Wang et al.

Summary: The paper proposes an LDP protocol for identifying heavy hitters and discusses optimal parameters and design principles. Experimental results show that PEM has better utility than existing solutions.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes

Tehsin Kanwal et al.

Summary: Privacy-preserving data publishing of EHRs for 1 to M datasets with MSAs presents challenges in balancing privacy and utility. Existing models show privacy disclosure issues and the widely used k-anonymity model is limited in protecting against identity disclosure. To address these limitations, a new extended privacy model is proposed for better privacy protection in practical datasets.

COMPUTERS & SECURITY (2021)

Article Multidisciplinary Sciences

A Practical Privacy-Preserving Publishing Mechanism Based on Personalized k-Anonymity and Temporal Differential Privacy for Wearable IoT Applications

Junqi Guo et al.

Summary: This paper proposes a privacy-preserving mechanism for physiological signals collected by wearable devices, combining k-anonymity and differential privacy methods to protect static and real-time data, with experimental results showing improved security index, data publishing efficiency and privacy protection level.

SYMMETRY-BASEL (2021)

Article Computer Science, Information Systems

Anonymization Techniques for Privacy Preserving Data Publishing: A Comprehensive Survey

Abdul Majeed et al.

Summary: Anonymization is a practical solution for protecting user privacy, with many data owners anonymizing data to safeguard user privacy. This paper systematically investigates relational and structural anonymization techniques, categorizes and evaluates existing anonymization methods, and discusses the challenges and research directions in privacy preserving data publishing involving social network and relational data.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

θ-Sensitive k-Anonymity: An Anonymization Model for IoT based Electronic Health Records

Razaullah Khan et al.

ELECTRONICS (2020)

Article Computer Science, Information Systems

A Survey on Privacy Properties for Data Publishing of Relational Data

Athanasios Zigomitros et al.

IEEE ACCESS (2020)

Article Geography

Privacy, space, and time: a survey on privacy-preserving continuous data publishing

Manos Katsomallos et al.

JOURNAL OF SPATIAL INFORMATION SCIENCE (2019)

Article Computer Science, Information Systems

Privacy-preserving tabular data publishing: A comprehensive evaluation from web to cloud

Saad A. Abdelhameed et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

An efficient privacy mechanism for electronic health records

Adeel Anjum et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

Incremental k-Anonymous Microaggregation in Large-Scale Electronic Surveys with Optimized Scheduling

David Rebollo-Monedero et al.

IEEE ACCESS (2018)

Article Medical Informatics

Utility-preserving anonymization for health data publishing

Hyukki Lee et al.

BMC MEDICAL INFORMATICS AND DECISION MAKING (2017)

Review Computer Science, Interdisciplinary Applications

Publishing data from electronic health records while preserving privacy: A survey of algorithms

Aris Gkoulalas-Divanis et al.

JOURNAL OF BIOMEDICAL INFORMATICS (2014)

Article Computer Science, Interdisciplinary Applications

A framework to preserve the privacy of electronic health data streams

Soohyung Kim et al.

JOURNAL OF BIOMEDICAL INFORMATICS (2014)

Article Computer Science, Information Systems

Extended k-anonymity models against sensitive attribute disclosure

Xiaoxun Sun et al.

COMPUTER COMMUNICATIONS (2011)

Article Computer Science, Theory & Methods

Privacy-Preserving Data Publishing: A Survey of Recent Developments

Benjamin C. M. Fung et al.

ACM COMPUTING SURVEYS (2010)

Article Computer Science, Theory & Methods

Achieving Anonymity via Clustering

Gagan Aggarwal et al.

ACM TRANSACTIONS ON ALGORITHMS (2010)

Article Computer Science, Information Systems

Centralized and Distributed Anonymization for High-Dimensional Healthcare Data

Noman Mohammed et al.

ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA (2010)

Article Computer Science, Artificial Intelligence

k-anonymity:: A model for protecting privacy

L Sweeney

INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS (2002)