期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
On Measuring the Privacy of Anonymized Data in Multiparty Network Data Sharing 被引量:1
1
作者 陈晓云 苏玉洁 +2 位作者 唐晓晟 黄小红 马严 《China Communications》 SCIE CSCD 2013年第5期120-127,共8页
This paper aims to find a practical way of quantitatively representing the privacy of network data. A method of quantifying the privacy of network data anonymization based on similarity distance and entropy in the sce... This paper aims to find a practical way of quantitatively representing the privacy of network data. A method of quantifying the privacy of network data anonymization based on similarity distance and entropy in the scenario involving multiparty network data sharing with Trusted Third Party (TTP) is proposed. Simulations are then conducted using network data from different sources, and show that the measurement indicators defined in this paper can adequately quantify the privacy of the network. In particular, it can indicate the effect of the auxiliary information of the adversary on privacy. 展开更多
关键词 privacy network data anonymization multiparty network data sharing
在线阅读 下载PDF
A New Privacy-Preserving Data Publishing Algorithm Utilizing Connectivity-Based Outlier Factor and Mondrian Techniques
2
作者 Burak Cem Kara Can Eyüpoglu 《Computers, Materials & Continua》 SCIE EI 2023年第8期1515-1535,共21页
Developing a privacy-preserving data publishing algorithm that stops individuals from disclosing their identities while not ignoring data utility remains an important goal to achieve.Because finding the trade-off betw... Developing a privacy-preserving data publishing algorithm that stops individuals from disclosing their identities while not ignoring data utility remains an important goal to achieve.Because finding the trade-off between data privacy and data utility is an NP-hard problem and also a current research area.When existing approaches are investigated,one of the most significant difficulties discovered is the presence of outlier data in the datasets.Outlier data has a negative impact on data utility.Furthermore,k-anonymity algorithms,which are commonly used in the literature,do not provide adequate protection against outlier data.In this study,a new data anonymization algorithm is devised and tested for boosting data utility by incorporating an outlier data detection mechanism into the Mondrian algorithm.The connectivity-based outlier factor(COF)algorithm is used to detect outliers.Mondrian is selected because of its capacity to anonymize multidimensional data while meeting the needs of real-world data.COF,on the other hand,is used to discover outliers in high-dimensional datasets with complicated structures.The proposed algorithm generates more equivalence classes than the Mondrian algorithm and provides greater data utility than previous algorithms based on k-anonymization.In addition,it outperforms other algorithms in the discernibility metric(DM),normalized average equivalence class size(Cavg),global certainty penalty(GCP),query error rate,classification accuracy(CA),and F-measure metrics.Moreover,the increase in the values of theGCPand error ratemetrics demonstrates that the proposed algorithm facilitates obtaining higher data utility by grouping closer data points when compared to other algorithms. 展开更多
关键词 data anonymization privacy-preserving data publishing K-ANONYMITY GENERALIZATION MONDRIAN
在线阅读 下载PDF
(r,QI)-Transform:Reversible Data Anonymity Based on Numeric Type of Data in Outsourced Database
3
作者 Iuon-Chang Lin Yang-Te Lee Chen-Yang Cheng 《Journal of Electronic Science and Technology》 CAS CSCD 2017年第3期222-230,共9页
An outsource database is a database service provided by cloud computing companies.Using the outsource database can reduce the hardware and software's cost and also get more efficient and reliable data processing capa... An outsource database is a database service provided by cloud computing companies.Using the outsource database can reduce the hardware and software's cost and also get more efficient and reliable data processing capacity.However,the outsource database still has some challenges.If the service provider does not have sufficient confidence,there is the possibility of data leakage.The data may has user's privacy,so data leakage may cause data privacy leak.Based on this factor,to protect the privacy of data in the outsource database becomes very important.In the past,scholars have proposed k-anonymity to protect data privacy in the database.It lets data become anonymous to avoid data privacy leak.But k-anonymity has some problems,it is irreversible,and easier to be attacked by homogeneity attack and background knowledge attack.Later on,scholars have proposed some studies to solve homogeneity attack and background knowledge attack.But their studies still cannot recover back to the original data.In this paper,we propose a data anonymity method.It can be reversible and also prevent those two attacks.Our study is based on the proposed r-transform.It can be used on the numeric type of attributes in the outsource database.In the experiment,we discussed the time required to anonymize and recover data.Furthermore,we investigated the defense against homogeneous attack and background knowledge attack.At the end,we summarized the proposed method and future researches. 展开更多
关键词 Index Terms--Cloud database data anonymity database privacy outsource database REVERSIBLE
在线阅读 下载PDF
Anonymous data collection scheme for cloud-aided mobile edge networks
4
作者 Anxi Wang Jian Shen +2 位作者 Chen Wang Huijie Yang Dengzhi Liu 《Digital Communications and Networks》 SCIE 2020年第2期223-228,共6页
With the rapid spread of smart sensors,data collection is becoming more and more important in Mobile Edge Networks(MENs).The collected data can be used in many applications based on the analysis results of these data ... With the rapid spread of smart sensors,data collection is becoming more and more important in Mobile Edge Networks(MENs).The collected data can be used in many applications based on the analysis results of these data by cloud computing.Nowadays,data collection schemes have been widely studied by researchers.However,most of the researches take the amount of collected data into consideration without thinking about the problem of privacy leakage of the collected data.In this paper,we propose an energy-efficient and anonymous data collection scheme for MENs to keep a balance between energy consumption and data privacy,in which the privacy information of senors is hidden during data communication.In addition,the residual energy of nodes is taken into consideration in this scheme in particular when it comes to the selection of the relay node.The security analysis shows that no privacy information of the source node and relay node is leaked to attackers.Moreover,the simulation results demonstrate that the proposed scheme is better than other schemes in aspects of lifetime and energy consumption.At the end of the simulation part,we present a qualitative analysis for the proposed scheme and some conventional protocols.It is noteworthy that the proposed scheme outperforms the existing protocols in terms of the above indicators. 展开更多
关键词 Cloud-aided mobile edge networks Anonymous data collection Communication model Path selection
在线阅读 下载PDF
A Study on Re-Identification of Natural Language Data Considering Korean Attributes
5
作者 Segyeong Bang Soeun Kim +2 位作者 Gaeun Ahn Hyemin Hong Junhyoung Oh 《Computers, Materials & Continua》 2025年第12期4629-4643,共15页
This study analyzes the risks of re-identification in Korean text data and proposes a secure,ethical approach to data anonymization.Following the‘Lee Luda’AI chatbot incident,concerns over data privacy have increase... This study analyzes the risks of re-identification in Korean text data and proposes a secure,ethical approach to data anonymization.Following the‘Lee Luda’AI chatbot incident,concerns over data privacy have increased.The Personal Information Protection Commission of Korea conducted inspections of AI services,uncovering 850 cases of personal information in user input datasets,highlighting the need for pseudonymization standards.While current anonymization techniques remove personal data like names,phone numbers,and addresses,linguistic features such as writing habits and language-specific traits can still identify individuals when combined with other data.To address this,we analyzed 50,000 Korean text samples from the X platform,focusing on language-specific features for authorship attribution.Unlike English,Korean features flexible syntax,honorifics,syllabic and grapheme patterns,and referential terms.These linguistic characteristics were used to enhance re-identification accuracy.Our experiments combined five machine learning models,six stopword processing methods,and four morphological analyzers.By using a tokenizer that captures word frequency and order,and employing the LSTM model,OKT morphological analyzer,and stopword removal,we achieved the maximum authorship attributions accuracy of 90.51%.This demonstrates the significant role of Korean linguistic features in re-identification.The findings emphasize the risk of re-identification through language data and call for a re-evaluation of anonymization methods,urging the consideration of linguistic traits in anonymization beyond simply removing personal information. 展开更多
关键词 Re-identification data anonymization authorship attributions Korean text
在线阅读 下载PDF
Towards a respondent-preferred k_i-anonymity model
6
作者 Kok-Seng WONG Myung Ho KIM 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2015年第9期720-731,共12页
Recently, privacy concerns about data collection have received an increasing amount of attention. In data collection process, a data collector (an agency) assumed that all respondents would be comfortable with submi... Recently, privacy concerns about data collection have received an increasing amount of attention. In data collection process, a data collector (an agency) assumed that all respondents would be comfortable with submitting their data if the published data was anonymous. We believe that this assumption is not realistic because the increase in privacy concerns causes some re- spondents to refuse participation or to submit inaccurate data to such agencies. If respondents submit inaccurate data, then the usefulness of the results from analysis of the collected data cannot be guaranteed. Furthermore, we note that the level of anonymity (i.e., k-anonymity) guaranteed by an agency cannot be verified by respondents since they generally do not have access to all of the data that is released. Therefore, we introduce the notion of ki-anonymity, where ki is the level of anonymity preferred by each respondent i. Instead of placing full trust in an agency, our solution increases respondent confidence by allowing each to decide the preferred level of protection. As such, our protocol ensures that respondents achieve their preferred kranonymity during data collection and guarantees that the collected records are genuine and useful for data analysis. 展开更多
关键词 Anonymous data collection Respondent-preferred privacy protection K-ANONYMITY
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部