Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019 - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …

Survey on privacy-preserving techniques for microdata publication

T Carvalho, N Moniz, P Faria, L Antunes - ACM Computing Surveys, 2023 - dl.acm.org
The exponential growth of collected, processed, and shared microdata has given rise to
concerns about individuals' privacy. As a result, laws and regulations have emerged to …

Enhancing data utility in differential privacy via microaggregation-based -anonymity

J Soria-Comas, J Domingo-Ferrer, D Sánchez… - The VLDB Journal, 2014 - Springer
It is not uncommon in the data anonymization literature to oppose the “old” k k-anonymity
model to the “new” differential privacy model, which offers more robust privacy guarantees …

Characterisation and Quantification of User Privacy: Key Challenges, Regulations, and Future Directions

R Arshad, MR Asghar - IEEE Communications Surveys & …, 2024 - ieeexplore.ieee.org
The protection of user privacy in the digital age has become an important concern with the
increase in data-driven technologies. These technologies generate large amounts of user …

[图书][B] Database anonymization: privacy models, data utility, and microaggregation-based inter-model connections

J Domingo-Ferrer, D Sánchez, J Soria-Comas - 2022 - books.google.com
The current social and economic context increasingly demands open data to improve
scientific research and decision making. However, when published data refer to individual …

A systematic comparison and evaluation of k-anonymization algorithms for practitioners

V Ayala-Rivera, P McDonagh, T Cerqueus, L Murphy - 2014 - researchrepository.ucd.ie
The vast amount of data being collected about individuals has brought new challenges in
protecting their privacy when this data is disseminated. As a result, Privacy-Preserving Data …

A semantic similarity method based on information content exploiting multiple ontologies

D Sánchez, M Batet - Expert Systems with Applications, 2013 - Elsevier
The quantification of the semantic similarity between terms is an important research area
that configures a valuable tool for text understanding. Among the different paradigms used …

MuLViS: Multi-level encryption based security system for surveillance videos

A Shifa, MN Asghar, M Fleury, N Kanwal… - Ieee …, 2020 - ieeexplore.ieee.org
Video Surveillance (VS) systems are commonly deployed for real-time abnormal event
detection and autonomous video analytics. Video captured by surveillance cameras in real …

[HTML][HTML] A semantic framework to protect the privacy of electronic health records with non-numerical attributes

S Martínez, D Sánchez, A Valls - Journal of biomedical informatics, 2013 - Elsevier
Structured patient data like Electronic Health Records (EHRs) are a valuable source for
clinical research. However, the sensitive nature of such information requires some …

Utility-preserving differentially private data releases via individual ranking microaggregation

D Sánchez, J Domingo-Ferrer, S Martínez… - Information …, 2016 - Elsevier
Being able to release and exploit open data gathered in information systems is crucial for
researchers, enterprises and the overall society. Yet, these data must be anonymized before …