Privacy Preserving and Data Publishing-Hybrid Approach
Abstract
Full Text:
PDFReferences
V.S. Iyengar. Transforming data to satisfy privacy constraints, In: Eighth ACM SIGKDD International Conference. 2002.
K. LeFevre, D.J. DeWitt, R. Ramakrishnan. Mondrian multidimensional k-anonymity, In: Proceedings of the 22Nd International Conference on Data Engineering. Washington, DC, USA: IEEE Computer Society, 2006.
K. Wang, P.S. Yu, S. Chakraborty. Bottom-up generalization: a data mining solution to privacy protection, In: Proceedings of the Fourth IEEE International Conference on Data Mining. Washington, DC, USA, 2004.
J. L. a. K. Wang, Anonymizing transaction data by integrating suppression and generalization, In: Proceedings of the 14th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining. Berlin, Heidelberg, 2010.
T. Dalenius. Towards a methodology for statistical disclosure, 1977.
B. K. a. T. Tassa. A practical Approximation Algorithm for Optimal k-Anonymity. Springer, 2011.
M. P. E. Poovammal. Task Independent Privacy preserving data mining on Medical Dataset, In: International Conference on Advances in Computing.
C.C. Aggarwal. ibm t. privacy-preserving data mining: models and algorithms privacy-preserving data mining: models and algorithms.
P.S.Y. Charu, C. Aggarwal, III. A survey of randomization methods for privacy-preserving data, In: Series Advances in Database Systems. Vol. 34.
N. Saranya, M. Karpagam, N. Muruganandham. Hybrid Approach for Data Publishing Using Privacy. Asian Research Publishing Network; 2017.
S. Yu. L. Gao, J. Niu, Y. Qu. Big data set privacy preserving through sensitive attribute-based grouping, In; IEEE ICC 2017 Communication and Information Systems Security Symposium. 2017, 6p.
DOI: https://doi.org/10.37628/ijods.v3i2.334
Refbacks
- There are currently no refbacks.