4.6 Article

A Survey on Privacy Properties for Data Publishing of Relational Data

期刊

IEEE ACCESS
卷 8, 期 -, 页码 51071-51099

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2020.2980235

关键词

Data privacy; Privacy; Publishing; Licenses; Sociology; Statistics; Data anonymization; privacy preserving data publishing; data protection; k-anonymity; privacy; review

资金

  1. European Commission through the Horizon 2020 Programme (H2020)
  2. OPERANDO Project [653704]
  3. YAKSHA Project [780498]
  4. LOCARD Project [832735]
  5. Government of Catalonia (GC) [2017-DI-002, 2017-SGR-896]
  6. Fundacio PuntCAT
  7. Vinton Cerf Distinction
  8. Spanish Ministry of Science and Technology [RTI2018-095499-B-C32]

向作者/读者索取更多资源

Recent advances in telecommunications and database systems have allowed the scientific community to efficiently mine vast amounts of information worldwide and to extract new knowledge by discovering hidden patterns and correlations. Nevertheless, all this shared information can be used to invade the privacy of individuals through the use of fusion and mining techniques. Simply removing direct identifiers such as name, SSN, or phone number is not anymore sufficient to prevent against these practices. In numerous cases, other fields, like gender, date of birth and/or zipcode, can be used to re-identify individuals and to expose their sensitive details, e.g. their medical conditions, financial statuses and transactions, or even their private connections. The scope of this work is to provide an in-depth overview of the current state of the art in Privacy-Preserving Data Publishing (PPDP) for relational data. To counter information leakage, a number of data anonymisation methods have been proposed during the past few years, including closeness, to name a few. In this study we analyse these methods providing concrete examples not only to explain how each of them works, but also to facilitate the reader to understand the different usage scenarios in which each of them can be applied. Furthermore, we detail several attacks along with their possible countermeasures, and we discuss open questions and future research directions.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据