Privacy by design in big data: an overview of privacy enhancing technologies in the era of big data analytics

G D'Acquisto, J Domingo-Ferrer, P Kikiras… - arXiv preprint arXiv …, 2015 - arxiv.org
The extensive collection and processing of personal information in big data analytics has
given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling …

Data privacy

V Torra, G Navarro‐Arribas - Wiley Interdisciplinary Reviews …, 2014 - Wiley Online Library
Data privacy studies methods, tools, and theory to avoid the disclosure of sensitive
information. Its origin is in statistics with the goal to ensure the confidentiality of data …

[图书][B] A Guide to Data Privacy

V Torra - 2022 - Springer
Data privacy is now a hot topic. Big data have increased its importance. Nevertheless,
computational methods for data privacy have been studied and developed since the 70s, at …

Privacy in data mining

V Torra - Data mining and knowledge discovery handbook, 2010 - Springer
35 Privacy in Data Mining Page 1 35 Privacy in Data Mining Vicenç Torra IIIA - CSIC, Campus
UAB s/n, 08193 Bellaterra Catalonia, Spain vtorra@iiia.csic.es Summary. In this chapter we …

Preference-based anonymization of numerical datasets by multi-objective microaggregation

R Mortazavi, S Jalili - Information Fusion, 2015 - Elsevier
Microaggregation is a statistical disclosure control mechanism to realize k-anonymity as a
basic privacy model. The method first partitions the dataset into groups of at least k records …

A definition for I-fuzzy partitions

V Torra, S Miyamoto - Soft Computing, 2011 - Springer
In this paper, we define I-fuzzy partitions (or intuitionistic fuzzy partitions as called by
Atanassov or interval-valued fuzzy partitions). As our ultimate goal is to compare the results …

On intuitionistic fuzzy clustering for its application to privacy

V Torra, S Miyamoto, Y Endo… - … Conference on Fuzzy …, 2008 - ieeexplore.ieee.org
Motivated by our research on specific information loss measures (in privacy preserving data
mining) and our need to compare fuzzy clusters, we proposed in a recent paper a definition …

[PDF][PDF] Fine granular proximity breach prevention during numerical data anonymization.

R Mortazavi, S Jalili - Trans. Data Priv., 2017 - tdp.cat
Microaggregation is known as a successful perturbative mechanism to realize k-anonymity.
The method partitions the dataset into groups of at least k members and then aggregates the …

I-fuzzy partitions for representing clustering uncertainties

V Torra, JH Min - Artificial Intelligence and Soft Computing: 10th …, 2010 - Springer
In a recent paper we introduced intuitionistic fuzzy partitions or interval-valued fuzzy
partitions as a way to represent the uncertainty of fuzzy clustering. In this paper we …

An overview of the use of clustering for data privacy

V Torra, G Navarro-Arribas, K Stokes - Unsupervised Learning Algorithms, 2016 - Springer
In this chapter we review some of our results related to the use of clustering in the area of
data privacy. The paper gives a brief overview of data privacy and, more specifically, on data …