Privacy preservation techniques in big data analytics: a survey

P Ram Mohan Rao, S Murali Krishna, AP Siva Kumar - Journal of Big Data, 2018 - Springer
Incredible amounts of data is being generated by various organizations like hospitals,
banks, e-commerce, retail and supply chain, etc. by virtue of digital technology. Not only …

Survey on privacy-preserving techniques for microdata publication

T Carvalho, N Moniz, P Faria, L Antunes - ACM Computing Surveys, 2023 - dl.acm.org
The exponential growth of collected, processed, and shared microdata has given rise to
concerns about individuals' privacy. As a result, laws and regulations have emerged to …

t-closeness: Privacy beyond k-anonymity and l-diversity

N Li, T Li, S Venkatasubramanian - 2007 IEEE 23rd …, 2006 - ieeexplore.ieee.org
The k-anonymity privacy requirement for publishing microdata requires that each
equivalence class (ie, a set of records that are indistinguishable from each other with respect …

System and method for protecting user privacy using social inference protection techniques

SG Motahari, Q Jones - US Patent 8,504,481, 2013 - Google Patents
US8504481B2 - System and method for protecting user privacy using social inference protection
techniques - Google Patents US8504481B2 - System and method for protecting user privacy …

Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation

J Domingo-Ferrer, V Torra - Data Mining and Knowledge Discovery, 2005 - Springer
Abstract k-Anonymity is a useful concept to solve the tension between data utility and
respondent privacy in individual data (microdata) protection. However, the generalization …

The anonymisation decision-making framework

M Elliot, E Mackey, K O'Hara, C Tudor - 2016 - eprints.soton.ac.uk
This book has been developed to address a need for a practical guide to anonymisation that
gives more operational advice than the ICO'sAnonymisation Code of Practice, whilst being …

A framework for evaluating the utility of data altered to protect confidentiality

AF Karr, CN Kohnen, A Oganian, JP Reiter… - The American …, 2006 - Taylor & Francis
When releasing data to the public, statistical agencies and survey organizations typically
alter data values in order to protect the confidentiality of survey respondents' identities and …

Disclosure risk vs. data utility: The RU confidentiality map as applied to topcoding

GT Duncan, SL Stokes - Chance, 2004 - Taylor & Francis
Americans are urged to be more savvyabout preventing their personal information from
falling into strangers' hands. We are advised to shred documents containing our Social …

[HTML][HTML] Data anonymization for pervasive health care: systematic literature mapping study

Z Zuo, M Watson, D Budgen, R Hall… - JMIR medical …, 2021 - medinform.jmir.org
Background Data science offers an unparalleled opportunity to identify new insights into
many aspects of human life with recent advances in health care. Using data science in …

[图书][B] Database anonymization: privacy models, data utility, and microaggregation-based inter-model connections

J Domingo-Ferrer, D Sánchez, J Soria-Comas - 2022 - books.google.com
The current social and economic context increasingly demands open data to improve
scientific research and decision making. However, when published data refer to individual …