Security services using blockchains: A state of the art survey

T Salman, M Zolanvari, A Erbad, R Jain… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
This paper surveys blockchain-based approaches for several security services. These
services include authentication, confidentiality, privacy and access control list, data and …

[HTML][HTML] Publishing data from electronic health records while preserving privacy: A survey of algorithms

A Gkoulalas-Divanis, G Loukides, J Sun - Journal of biomedical informatics, 2014 - Elsevier
Abstract The dissemination of Electronic Health Records (EHRs) can be highly beneficial for
a range of medical studies, spanning from clinical trials to epidemic control studies, but it …

Never walk alone: Uncertainty for anonymity in moving objects databases

O Abul, F Bonchi, M Nanni - 2008 IEEE 24th international …, 2008 - ieeexplore.ieee.org
Preserving individual privacy when publishing data is a problem that is receiving increasing
attention. According to the fc-anonymity principle, each release of data must be such that …

Big data security and privacy

E Bertino, E Ferrari - A comprehensive guide through the Italian database …, 2017 - Springer
Recent technologies, such as IoT, social networks, cloud computing, and data analytics,
make today possible to collect huge amounts of data. However, for data to be used to their …

On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy

N Li, W Qardaji, D Su - Proceedings of the 7th ACM Symposium on …, 2012 - dl.acm.org
This paper aims at answering the following two questions in privacy-preserving data
analysis and publishing. The first is: What formal privacy guarantee (if any) does k …

Orchestra: Unsupervised federated learning via globally consistent clustering

ES Lubana, CI Tang, F Kawsar, RP Dick… - arXiv preprint arXiv …, 2022 - arxiv.org
Federated learning is generally used in tasks where labels are readily available (eg, next
word prediction). Relaxing this constraint requires design of unsupervised learning …

Towards trajectory anonymization: a generalization-based approach

ME Nergiz, M Atzori, Y Saygin - … of the SIGSPATIAL ACM GIS 2008 …, 2008 - dl.acm.org
Trajectory datasets are becoming more and more popular due to the massive usage of GPS
and other location-based devices and services. In this paper, we address privacy issues …

Data and Structural k-Anonymity in Social Networks

A Campan, TM Truta - International Workshop on Privacy, Security, and …, 2008 - Springer
The advent of social network sites in the last years seems to be a trend that will likely
continue. What naive technology users may not realize is that the information they provide …

A review of anonymization for healthcare data

IE Olatunji, J Rauch, M Katzensteiner, M Khosla - Big data, 2022 - liebertpub.com
Mining health data can lead to faster medical decisions, improvement in the quality of
treatment, disease prevention, and reduced cost, and it drives innovative solutions within the …

A Clustering Approach for the l‐Diversity Model in Privacy Preserving Data Mining Using Fractional Calculus‐Bacterial Foraging Optimization Algorithm

PR Bhaladhare, DC Jinwala - Advances in Computer …, 2014 - Wiley Online Library
In privacy preserving data mining, the l‐diversity and k‐anonymity models are the most
widely used for preserving the sensitive private information of an individual. Out of these two …