Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 11
Page No. 4205 - 4216

Personalized Privacy Preserving Incremental Data Dissemination Through Optimal Generalization

Authors : S. Ram Prasad Reddy, K.V.S.V.N. Raju and V. Valli Kumari

References

Bayardo, R.J. and R. Agrawal, 2005. Data privacy through optimal k-anonymization. Proceedings of the 21st International Conference on Data Engineering ICDE 2005, April 5-8, 2005, IEEE, London, USA., pp: 217-228.

Blum, A., K. Liggett and A. Roth, 2008. A learning theory approach to non-interactive database privacy. Proceedings of the 40th Annual ACM Symposium on Theory of Computing, May 17-20, 2008, ACM, Victoria, British, Columbia, ISBN:978-1-60558-047-0, pp: 609-618.

Bu, Y., A.W.C. Fu, R.C.W. Wong, L. Chen and J. Li, 2008. Privacy preserving serial data publishing by role composition. Proc. VLDB. Endowment, 1: 845-856.
CrossRef  |  Direct Link  |  

Byun, J.W., Y. Sohn, E. Bertino and N. Li, 2006. Secure Anonymization for Incremental Datasets. In: Secure Data Management, Jonker, W. and Petkovic M. (Eds.). Springer, Berlin, Germany, ISBN:978-3-540-38984-2, pp: 48-63.

Cao, J., B. Carminati, E. Ferrari and K.L. Tan, 2008. CASTLE: A delay-constrained scheme for ks-anonymizing data streams. Proceedings of the IEEE 24th International Conference on Data Engineering (ICDE’08), April 7-12, 2008, IEEE, Cancun, Mexico, ISBN:978-1-4244-1836-7, pp: 1376-1378.

Chawla, S., C. Dwork, F. McSherry, A. Smith and H. Wee, 2005. Toward Privacy in Public Databases. In: Theory of Cryptography, Kilian, J. (Ed.). Springer, Berlin, Germany, ISBN:978-3-540-24573-5, pp: 363-385.

Dwork, C., 2006. Differential privacy. Proceedings of the 33rd International Conference on Automata, Languages and Programming, July 10-14, 2006, ACM, Venice, Italy, ISBN:3-540-35907-9 978-3-540-35907-4, pp: 1-12.

Fung, B., K. Wang, A.W.C. Fu and J. Pei, 2008. Anonymity for continuous data publishing. Proceedings of the 11th International Conference on Extending Database Technology: Advances in Database Technology, March 25-29, 2008, ACM, Nantes, France, ISBN:978-1-59593-926-5, pp: 264-275.

Fung, B.C.M., K. Wang and P.S. Yu, 2005. Top-down specialization for information and privacy preservation. Proceedings of the 21st IEEE International Conference on Data Engineering, April 5-8, 2005, Tokyo, Japan, pp: 205-216.

Inan, A., M. Kantarcioglu and E. Bertino, 2009. Using anonymized data for classification. Proceedings of the IEEE 25th International Conference on Data Engineering (ICDE'09), March 29-April 2, 2009, IEEE, Shanghai, China, ISBN:978-1-4244-3422-0, pp: 429-440.

Kumari, V.V., S.R.P. Reddy, M.A. Sowjanya, B.J. Vazram and K.V.S.V.N. Raju, 2008. A novel approach for privacy preserving publication of data. Proceedings of the 2008 International Conference on Data Mining, July 14-17, 2008, DBLP, Las Vegas, USA, pp: 506-512.

LeFevre, K., D.J. DeWitt and R. Ramakrishnan, 2005. Incognito: Efficient full-domain K-anonymity. Proceedings of the ACM SIGMOD International Conference on Management of Data, June 14-16, 2005, ACM, Baltimore, Maryland, ISBN:1-59593-060-4, pp: 49-60.

LeFevre, K., D.J. DeWitt and R. Ramakrishnan, 2006. Mondrian multidimensional K-anonymity. Proceedings of the 22nd International Conference on Data Engineering (ICDE'06), April 3-7, 2006, IEEE, Atlanta, Georgia, USA., pp: 25-25.

Li, N., T. Li and S. Venkatasubramanian, 2007. T-closeness: Privacy beyond k-anonymity and l-diversity. Proceedings of the IEEE 23rd International Conference on Data Engineering ICDE 2007, April 15-20, 2007, IEEE, Istanbul, Turkey, ISBN: 1-4244-0802-4, pp: 106-115.

Lichman, M., 2013. UCI Machine Learning Repository. University of California, Irvine, California,.

Machanavajjhala, A., J. Gehrke, D. Kifer and M. Venkitasubramaniam, 2006. L-diversity: Privacy beyond K-anonymity. Proceedings of the 22nd International Conference on Data Engineering (ICDE'06), April 3-7, 2006, IEEE, Atlanta,Georgia, USA., pp: 24-24.

Mohammed, N., B. Fung, P.C. Hung and C.K. Lee, 2009. Anonymizing healthcare data: A case study on the blood transfusion service. Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, June 28-July 01, 2009, ACM, Paris, France, ISBN:978-1-60558-495-9, pp: 1285-1294.

Pei, J., J. Xu, Z. Wang, W. Wang and K. Wang, 2007. Maintaining K-anonymity against incremental updates. Proceedings of the 19th International Conference on Scientific and Statistical Database Management (SSBDM'07), July 9-11, 2007, IEEE, Banff, Alberta, Canada, pp: 5-5.

Rastogi, V., D. Suciu and S. Hong, 2007. The boundary between privacy and utility in data publishing. Proceedings of the 33rd International Conference on Very Large Data Bases, September 23-28, 2007, VLDB Endowment, Austria, ISBN: 978-1-59593-649-3, pp: 531-542.

Samarati, P., 2001. Protecting respondents identities in microdata release. IEEE. Trans. Knowl. Data Eng., 13: 1010-1027.
CrossRef  |  Direct Link  |  

Sweeney, L., 2002. Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertainty Fuzziness Knowledge-Base Syst., 10: 571-588.
Direct Link  |  

Sweeney, L., 2002. k-Anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst., 10: 557-570.
CrossRef  |  

Wang, K. and B. Fung, 2006. Anonymizing sequential releases. Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 20-23, 2006, ACM, Philadelphia, Pennsylvania, ISBN:1-59593-339-5, pp: 414-423.

Wang, K., B.C. Fung and S.Y. Philip, 2007. Handicapping attacker’s confidence: An alternative to K-anonymization. Knowl. Inf. Syst., 11: 345-368.
Direct Link  |  

Wang, K., Y. Xu, A.W. Fu and R.C. Wong, 2009. FF-anonymity: When quasi-identifiers are missing. Proceedings of the IEEE 25th International Conference on Data Engineering (ICDE'09), March 29-April 2, 2009, IEEE, Shanghai, China, ISBN:978-1-4244-3422-0, pp: 1136-1139.

Wong, R.C.W., A.W.C. Fu, J. Liu, K. Wang and Y. Xu, 2009. Preserving individual privacy in serial data publishing. CoRR., 1: 1-12.
Direct Link  |  

Wong, R.C.W., J. Li, A.W.C. Fu and K. Wang, 2006. The (α, k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing. Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 20-23, 2006, ACM, New York, USA., ISBN:1-59593-339-5, pp: 754-759.

Xiao, X. and Y. Tao, 2006. Personalized privacy preservation. Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, June 27-29, 2006, ACM, Chicago, Illinois, USA., ISBN:1-59593-434-0, pp: 229-240.

Xiao, X. and Y. Tao, 2007. M-invariance: Towards privacy preserving re-publication of dynamic datasets. Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, June 11-14, 2007, ACM, Beijing, China, ISBN:978-1-59593-686-8, pp: 689-700.

Xu, Y., K. Wang, A.W.C. Fu and P.S. Yu, 2008. Anonymizing transaction databases for publication. Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 24-27, 2008, ACM, Las Vegas, Nevada, USA., ISBN:978-1-60558-193-4, pp: 767-775.

Zhang, Q., N. Koudas, D. Srivastava and T. Yu, 2007. Aggregate query answering on anonymized tables. Proceedings of the 23rd IEEE International Conference on Data Engineering Workshops, April 15-20, 2007, Istanbul, Turkey, pp: 116-125.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved