【24h】

A Comparative Study of Data Anonymization Techniques

机译:数据匿名化技术的比较研究

获取原文

摘要

In today's digital era, it is a very common practice for organizations to collect data from individual users. The collected data is then stored in multiple databases which contain personally identifiable information (PII). This may lead to a major source of privacy risk for the database. Various privacy preservation techniques have been proposed such as perturbation, anonymization and cryptographic. In this study, five anonymization techniques are compared using the same dataset. In addition to that, this study reviews the strengths and weaknesses of the different technique. In the evaluation of efficiency, suppression is found as the most efficient while swapping is in the last place. It is also revealed that swapping is the most resource-consuming technique while suppressing being less resource consuming.
机译:在当今的数字时代,组织从个人用户收集数据是一种非常普遍的做法。然后将收集的数据存储在包含个人身份信息(PII)的多个数据库中。这可能导致数据库隐私风险的主要来源。已经提出了各种隐私保护技术,例如扰动,匿名化和加密。在这项研究中,使用相同的数据集比较了五种匿名化技术。除此之外,本研究还回顾了不同技术的优缺点。在效率评估中,发现抑制是最有效的,而交换位于最后。还揭示了交换是最消耗资源的技术,同时抑制了较少的资源消耗。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号