Data anonymization evaluation for big data and IoT environment

C Ni, LS Cang, P Gope, G Min - Information Sciences, 2022 - Elsevier
The growth of big data can increase risks of re-identification in complex IoT environment.
Data anonymization is widely used to prevent shared data from being re-identified private or …

Privacy enhancing techniques in the internet of things using data anonymisation

W Ren, X Tong, J Du, N Wang, S Li, G Min… - Information Systems …, 2021 - Springer
Abstract The Internet of Things (IoT) and Industrial 4.0 bring enormous potential benefits by
enabling highly customised services and applications, which create huge volume and …

A comparative study of data anonymization techniques

S Murthy, AA Bakar, FA Rahim… - 2019 IEEE 5th Intl …, 2019 - ieeexplore.ieee.org
In today's digital era, it is a very common practice for organizations to collect data from
individual users. The collected data is then stored in multiple databases which contain …

Injecting purpose and trust into data anonymisation

X Sun, H Wang, J Li - Proceedings of the 18th ACM conference on …, 2009 - dl.acm.org
Most existing works of data anonymisation target at the optimization of the anonymisation
metrics to balance the data utility and privacy, whereas they ignore the effects of a …

An efficient big data anonymization algorithm based on chaos and perturbation techniques

C Eyupoglu, MA Aydin, AH Zaim, A Sertbas - Entropy, 2018 - mdpi.com
The topic of big data has attracted increasing interest in recent years. The emergence of big
data leads to new difficulties in terms of protection models used for data privacy, which is of …

A decision-support framework for data anonymization with application to machine learning processes

L Caruccio, D Desiato, G Polese, G Tortora… - Information …, 2022 - Elsevier
The application of machine learning techniques to large and distributed data archives might
result in the disclosure of sensitive information about the data subjects. Data often contain …

Hierarchical anonymization algorithms against background knowledge attack in data releasing

F Amiri, N Yazdani, A Shakery, AH Chinaei - Knowledge-Based Systems, 2016 - Elsevier
Preserving privacy in the presence of adversary's background knowledge is very important
in data publishing. The k-anonymity model, while protecting identity, does not protect against …

Privacy preserving big data publishing: a scalable k‐anonymization approach using MapReduce

BB Mehta, UP Rao - Iet Software, 2017 - Wiley Online Library
Big data is collected and processed using different sources and tools that lead to privacy
issues. Privacy preserving data publishing techniques such as k‐anonymity, l‐diversity, and …

Privacy preserving data publishing and data anonymization approaches: A review

P Goswami, S Madan - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
The data engineering research community has fiercely felt the requisite for privacy of data of
individuals. With technological advancement, every single of action of life is collected and …

K-VARP: K-anonymity for varied data streams via partitioning

A Otgonbayar, Z Pervez, K Dahal, S Eager - Information Sciences, 2018 - Elsevier
Abstract The Internet-of-Things (IoT) produces and transmits enormous amounts of data.
Extracting valuable information from this enormous volume of data has become an important …