Privacy by design in big data: an overview of privacy enhancing technologies in the era of big data analytics

G D'Acquisto, J Domingo-Ferrer, P Kikiras… - arXiv preprint arXiv …, 2015 - arxiv.org
The extensive collection and processing of personal information in big data analytics has
given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling …

[图书][B] A Guide to Data Privacy

V Torra - 2022 - Springer
Data privacy is now a hot topic. Big data have increased its importance. Nevertheless,
computational methods for data privacy have been studied and developed since the 70s, at …

Privacy models and disclosure risk measures

V Torra, V Torra - Data Privacy: Foundations, New Developments and the …, 2017 - Springer
Privacy Models and Disclosure Risk Measures | SpringerLink Skip to main content
Advertisement SpringerLink Account Menu Find a journal Publish with us Track your research …

Extended results on privacy against coalitions of users in user-private information retrieval protocols

CM Swanson, DR Stinson - Cryptography and Communications, 2015 - Springer
In peer-to-peer user-private information retrieval, or P2P UPIR, the goal is to provide
increased privacy for users querying a database. This is accomplished by leveraging a P2P …

Multiple releases of k-anonymous data sets and k-anonymous relational databases

K Stokes, V Torra - … of Uncertainty, Fuzziness and Knowledge-Based …, 2012 - World Scientific
In data privacy, the evaluation of the disclosure risk has to take into account the fact that
several releases of the same or similar information about a population are common. In this …

Data privacy

V Torra, G Navarro-Arribas, K Stokes - Data Science in Practice, 2019 - Springer
In this chapter we present an overview of the topic data privacy. We review privacy models
and measures of disclosure risk. These models and measures provide computational …

Re-identification of vehicular location-based metadata

Z Tan, C Wang, X Fu, J Cui, C Jiang, W Han - EAI Endorsed Transactions …, 2017 - eudl.eu
Amid the flourish of various data services, the privacy problems on metadata have received
sufficient attention. Generally, the identity is the most sensitive attribute in metadata as …

Unique on the road: Re-identification of vehicular location-based metadata

Z Xiao, C Wang, W Han, C Jiang - … , October 10-12, 2016, Proceedings 12, 2017 - Springer
For digging individuals' information from anonymous metadata, usually the first step is to
identify the entities in metadata and associate them with persons in the real world. If an entity …

Selected Privacy Research Topics in the ARES Project: An Overview

JA Manjón, J Domingo-Ferrer - Advanced Research in Data Privacy, 2014 - Springer
Selected Privacy Research Topics in the ARES Project: An Overview | SpringerLink Skip to
main content Advertisement SpringerLink Account Menu Find a journal Publish with us Track …

A survey on the use of combinatorial configurations for anonymous database search

K Stokes, M Bras-Amorós - Advanced Research in Data Privacy, 2015 - Springer
The peer-to-peer user-private information retrieval (P2P UPIR) protocol is an anonymous
database search protocol in which the users collaborate in order to protect their privacy. This …