4.6 Article

Improved angelization technique against background knowledge attack for 1:M microdata

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Preserving Privacy of High-Dimensional Data by l-Diverse Constrained Slicing

Zenab Amin et al.

Summary: In the modern world of digitalization, privacy preservation has become an important concern due to the widespread adoption of IoT and cloud-based smart devices. However, there is a lack of research on privacy solutions for high-dimensional data. This paper proposes a novel privacy-preserving model that can effectively protect high-dimensional data from various privacy attacks.

ELECTRONICS (2022)

Article Health Policy & Services

A near real-time electronic health record-based COVID-19 surveillance system: An experience from a developing country

Abbas Sheikhtaheri et al.

Summary: This study demonstrates the experience of implementing a near real-time electronic health record-based surveillance system for COVID-19 in Iran. The system allows monitoring of COVID-19 cases and automatic notification to stakeholders. It facilitates resource allocation and the establishment of isolation centers based on aggregated data.

HEALTH INFORMATION MANAGEMENT JOURNAL (2022)

Article

Digital Vaccination Records: Exploring Stakeholder Perceptions in Gauteng, South Africa

Wesley Moonsamy et al.

The African Journal of Information and Communication (2022)

Article Computer Science, Information Systems

Toward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook

Abdul Majeed et al.

Summary: This paper provides a comprehensive analysis of clustering-based anonymization mechanisms (CAMs) for privacy preservation and utility in data publishing. It categorizes the existing CAMs based on different data types and reviews their evaluation metrics. The paper highlights the significance of CAMs in privacy preservation and presents representative CAMs that compromise individual privacy. It also identifies research gaps and suggests promising opportunities for future research.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

Heap Bucketization Anonymity-An Efficient Privacy-Preserving Data Publishing Model for Multiple Sensitive Attributes

J. Jayapradha et al.

Summary: The publication of a patient's dataset is crucial for medical investigations and decision-making. Existing privacy models often overlook the correlation among sensitive attributes, resulting in substantial utility loss. A model called Heap Bucketization-anonymity (HBA) is proposed to achieve a balance between privacy and utility by using anatomization for the dataset. The HBA model shows significant privacy improvement with less utility loss compared to other models, while also addressing various privacy attacks.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

The Security of Medical Data on Internet Based on Differential Privacy Technology

Zhihan Lv et al.

Summary: The study discusses the security of medical data in the Internet era and proposes an algorithm model combining k-anonymity and differential privacy. Results show that the model based on differential privacy has the best performance in privacy protection and highest operational efficiency.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2021)

Review Computer Science, Theory & Methods

A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions

Xuefei Yin et al.

Summary: In the past four years, federated learning (FL) has rapidly developed, but new privacy concerns have emerged during the aggregation of distributed intermediate results. Privacy-preserving federated learning (PPFL) is considered as a solution to privacy-preserving machine learning, but the challenge of protecting data privacy while maintaining data utility remains.

ACM COMPUTING SURVEYS (2021)

Article Computer Science, Information Systems

A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes

Tehsin Kanwal et al.

Summary: Privacy-preserving data publishing of EHRs for 1 to M datasets with MSAs presents challenges in balancing privacy and utility. Existing models show privacy disclosure issues and the widely used k-anonymity model is limited in protecting against identity disclosure. To address these limitations, a new extended privacy model is proposed for better privacy protection in practical datasets.

COMPUTERS & SECURITY (2021)

Proceedings Paper Computer Science, Information Systems

Spatial K-anonymity: A Privacy-preserving Method for COVID-19 Related Geo-spatial Technologies

Rohan Iyer et al.

Summary: As geo-spatial technologies continue to be used for COVID-19-related issues, the need for spatial privacy has become more prominent. Spatial k-anonymity offers a solution that balances privacy and utility, with applications in data sharing, managing COVID-19 contact tracing technologies, and showing travel history. By comparing it with other spatial privacy methods, there is potential to address the increasing risks associated with spatial privacy.

PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON GEOGRAPHICAL INFORMATION SYSTEMS THEORY, APPLICATIONS AND MANAGEMENT (GISTAM) (2021)

Article Computer Science, Information Systems

θ-Sensitive k-Anonymity: An Anonymization Model for IoT based Electronic Health Records

Razaullah Khan et al.

ELECTRONICS (2020)

Article Computer Science, Artificial Intelligence

IMPROVED K-ANONYMIZE AND L-DIVERSE APPROACH FOR PRIVACY PRESERVING BIG DATA PUBLISHING USING MPSEC DATASET

Priyank Jain et al.

COMPUTING AND INFORMATICS (2020)

Article Computer Science, Artificial Intelligence

Two privacy-preserving approaches for data publishing with identity reservation

Jinyan Wang et al.

KNOWLEDGE AND INFORMATION SYSTEMS (2019)

Article Computer Science, Information Systems

Remote health monitoring of elderly through wearable sensors

Mohammed Al-khafajiy et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Editorial Material Construction & Building Technology

An effective privacy preserving mechanism for 1: M microdata with high utility

Adeel Anjum et al.

SUSTAINABLE CITIES AND SOCIETY (2019)

Article Computer Science, Information Systems

Protecting Trajectory From Semantic Attack Considering k-Anonymity, l-Diversity, and t-Closeness

Zhen Tu et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2019)

Article Computer Science, Information Systems

Privacy-preserving model and generalization correlation attacks for 1:M data with multiple sensitive attributes

Tehsin Kanwal et al.

INFORMATION SCIENCES (2019)

Review Computer Science, Information Systems

A Survey on Internet of Things and Cloud Computing for Healthcare

L. Minh Dang et al.

ELECTRONICS (2019)

Article Engineering, Multidisciplinary

Gaussian Regularized Periodic Nonuniform Sampling Series

Feng Wang et al.

MATHEMATICAL PROBLEMS IN ENGINEERING (2019)

Article Computer Science, Information Systems

A New Method of Privacy Protection: Random k-Anonymous

Fagen Song et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

An efficient privacy mechanism for electronic health records

Adeel Anjum et al.

COMPUTERS & SECURITY (2018)

Article Engineering, Electrical & Electronic

Real-Time Cloud-Based Health Tracking and Monitoring System in Designed Boundary for Cardiology Patients

Aamir Shahzad et al.

JOURNAL OF SENSORS (2018)

Article Computer Science, Information Systems

Application of Temperature Prediction Based on Neural Network in Intrusion Detection of IoT

Xuefei Liu et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Article Telecommunications

An Improved Algorithm of Individuation K-Anonymity for Multiple Sensitive Attributes

Lin Zhang et al.

WIRELESS PERSONAL COMMUNICATIONS (2017)

Article Computer Science, Artificial Intelligence

Anonymizing 1:M microdata with high utility

Qiyuan Gong et al.

KNOWLEDGE-BASED SYSTEMS (2017)

Article Mathematical & Computational Biology

Privacy Preservation in Skewed Data Using Frequency Distribution and Weightage (FDW)

Mobashirah Nasir et al.

JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS (2017)

Article Computer Science, Information Systems

Modeling and Analysis of State-of-the-art VM-based Cloud Management Platforms

Saif U. R. Malik et al.

IEEE Transactions on Cloud Computing (2013)