【24h】

Analysis of privacy preserving K-anonymity methods and techniques

机译:隐私保护K匿名方法与技术分析

获取原文

摘要

Many applications employing the data mining techniques involve mining the data that includes private and sensitive information about the subjects. K-anonymity is a property that models the protection of released data against possible re-identification of the respondents to which the data refers. One of the interesting aspects of k-anonymity is its association with protection techniques that preserve the truthfulness of the data. It is however evident that the collection and analysis of data that include personal information may violate the privacy of the individuals to whom information refers. To guarantee the k-anonymity requirement, k-anonymity requires each quasi-identifier value in the released table to have at least k occurrences. In this paper, we present a survey of recent approaches that have been applied to the k-Anonymity problem.
机译:采用数据挖掘技术的许多应用程序都涉及对数据的挖​​掘,这些数据包括有关主题的私人和敏感信息。 K-匿名性是一种属性,用于对发布的数据进行保护,以防止对数据所引用的响应者进行重新标识。 k匿名性的有趣方面之一是它与保留数据真实性的保护技术的关联。但是,很明显,收集和分析包含个人信息的数据可能会侵犯信息所引用的个人的隐私。为了保证k匿名性要求,k匿名性要求已发布表中的每个准标识符值至少出现k次。在本文中,我们对已应用于k-匿名问题的最新方法进行了概述。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号