메뉴 건너뛰기




Volumn 12, Issue 5, 2015, Pages 504-518

Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility

Author keywords

Differential Privacy; Optimization; Sampling; Search Log; Secure Multiparty Computation

Indexed keywords

COMPUTATION THEORY; ELECTRICAL ENGINEERING; OPTIMIZATION; SAMPLING;

EID: 84962019537     PISSN: 15455971     EISSN: 19410018     Source Type: Journal    
DOI: 10.1109/TDSC.2014.2369034     Document Type: Article
Times cited : (68)

References (48)
  • 4
    • 34250017239 scopus 로고    scopus 로고
    • A face is exposed for aol searcher 4417749
    • Aug.
    • M. Barbaro and T. Zeller Jr, "A face is exposed for aol searcher no. 4417749," New York Times, Aug. 2006, http://www.nytimes. com/2006/08/09/technology/09aol.htmlpagewanted=all&r=0
    • (2006) New York Times
    • Barbaro, M.1    Zeller, T.2
  • 5
    • 55149118992 scopus 로고    scopus 로고
    • A survey of query log privacy-enhancing techniques from a policy perspective
    • A. Cooper, "A survey of query log privacy-enhancing techniques from a policy perspective," ACM Trans. Web, vol. 2, no. 4, pp. 191-1927, 2008.
    • (2008) ACM Trans. Web , vol.2 , Issue.4 , pp. 191-1927
    • Cooper, A.1
  • 11
    • 26444553177 scopus 로고    scopus 로고
    • Encryption schemes
    • Cambridge, U.K.: Cambridge Univ. Press
    • O. Goldreich, "Encryption schemes," in The Foundations of Cryptography, vol. 2. Cambridge, U.K.: Cambridge Univ. Press, 2004.
    • (2004) The Foundations of Cryptography , vol.2
    • Goldreich, O.1
  • 13
    • 84863012396 scopus 로고    scopus 로고
    • Publishing search logs -A comparative study of privacy guarantees
    • Mar.
    • M. Gotz, A. Machanavajjhala, G. Wang, X. Xiao, and J. Gehrke, "Publishing search logs-a comparative study of privacy guarantees," IEEE Trans. Knowl. Data Eng., vol. 24, no. 3, pp. 520-532, Mar. 2012.
    • (2012) IEEE Trans. Knowl. Data Eng. , vol.24 , Issue.3 , pp. 520-532
    • Gotz, M.1    MacHanavajjhala, A.2    Wang, G.3    Xiao, X.4    Gehrke, J.5
  • 14
    • 65449131477 scopus 로고    scopus 로고
    • Researchers yearn to use aol logs, but they hesitate
    • Aug.
    • K. Hafner, "Researchers yearn to use aol logs, but they hesitate," New York Times, Aug. 2006, http://www.nytimes.com/2006/08/23/technology/23search.htmlpagewanted=all
    • (2006) New York Times
    • Hafner, K.1
  • 17
    • 78049372159 scopus 로고    scopus 로고
    • Anonymization of set-valued data via top-down, local generalization
    • Y. He and J. F. Naughton, "Anonymization of set-valued data via top-down, local generalization," Proc. VLDB Endowment, vol. 2, no. 1, pp. 934-945, 2009.
    • (2009) Proc. VLDB Endowment , vol.2 , Issue.1 , pp. 934-945
    • He, Y.1    Naughton, J.F.2
  • 19
    • 84872255959 scopus 로고    scopus 로고
    • Secure and efficient distributed linear programming
    • Y. Hong, J. Vaidya, and H. Lu, "Secure and efficient distributed linear programming," J. Comput. Secur., vol. 20, no. 5, pp. 583-634, 2012.
    • (2012) J. Comput. Secur. , vol.20 , Issue.5 , pp. 583-634
    • Hong, Y.1    Vaidya, J.2    Lu, H.3
  • 20
    • 36048997303 scopus 로고    scopus 로고
    • A secure distributed framework for achieving k-anonymity
    • W. Jiang and C. Clifton, "A secure distributed framework for achieving k-anonymity," VLDB J., vol. 15, no. 4, pp. 316-333, 2006.
    • (2006) VLDB J. , vol.15 , Issue.4 , pp. 316-333
    • Jiang, W.1    Clifton, C.2
  • 28
    • 84871996662 scopus 로고    scopus 로고
    • On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy
    • N. Li, W. Qardaji, and D. Su, "On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy," in Proc. 7th ACM Symp. Inform., Comput. Commun. Security, 2012, pp. 32-33.
    • (2012) Proc. 7th ACM Symp. Inform., Comput. Commun. Security , pp. 32-33
    • Li, N.1    Qardaji, W.2    Su, D.3
  • 29
    • 84872266260 scopus 로고    scopus 로고
    • Privacy-preserving horizontally partitioned linear programs with inequality constraints
    • W. Li, H. Li, and C. Deng, "Privacy-preserving horizontally partitioned linear programs with inequality constraints," Optim. Lett., vol. 7, no. 1, pp. 137-144, 2013.
    • (2013) Optim. Lett. , vol.7 , Issue.1 , pp. 137-144
    • Li, W.1    Li, H.2    Deng, C.3
  • 30
    • 79951740865 scopus 로고    scopus 로고
    • Enforcing vocabulary k-anonymity by semantic similarity based clustering
    • J. Liu and K. Wang, "Enforcing vocabulary k-anonymity by semantic similarity based clustering," in Proc. IEEE Int. Conf. Data Mining, 2010, pp. 899-904.
    • (2010) Proc IEEE Int. Conf. Data Mining , pp. 899-904
    • Liu, J.1    Wang, K.2
  • 31
    • 84857650296 scopus 로고    scopus 로고
    • Privacy-preserving horizontally partitioned linear programs
    • O. L. Mangasarian, "Privacy-preserving horizontally partitioned linear programs," Optim. Lett., vol. 6, no. 3, pp. 431-436, 2012.
    • (2012) Optim. Lett. , vol.6 , Issue.3 , pp. 431-436
    • Mangasarian, O.L.1
  • 33
    • 79960442271 scopus 로고    scopus 로고
    • Anonymity meets game theory: Secure data integration with malicious participants
    • N. Mohammed, B. C. M. Fung, and M. Debbabi, "Anonymity meets game theory: secure data integration with malicious participants," VLDB J., vol. 20, no. 4, pp. 567-588, 2011.
    • (2011) VLDB J. , vol.20 , Issue.4 , pp. 567-588
    • Mohammed, N.1    Fung, B.C.M.2    Debbabi, M.3
  • 34
    • 78149335185 scopus 로고    scopus 로고
    • Centralized and distributed anonymization for high-dimensional healthcare data
    • N. Mohammed, B. C. M. Fung, P. C. K. Hung, and C. K. Lee, "Centralized and distributed anonymization for high-dimensional healthcare data," ACM Trans. Knowl. Discovery Data, vol. 4, no. 4, p. 18, 2010.
    • (2010) ACM Trans. Knowl. Discovery Data , vol.4 , Issue.4 , pp. 18
    • Mohammed, N.1    Fung, B.C.M.2    Hung, P.C.K.3    Lee, C.K.4
  • 37
    • 84942550998 scopus 로고    scopus 로고
    • Public key cryptosystems based on composite degree residuosity classes
    • P. Paillier, "Public key cryptosystems based on composite degree residuosity classes," in Proc. Int. Conf. Theory Appl. Cryptographic Tech., 1999, pp. 223-238.
    • (1999) Proc. Int. Conf. Theory Appl. Cryptographic Tech. , pp. 223-238
    • Paillier, P.1
  • 39
    • 84903191046 scopus 로고    scopus 로고
    • Ph.D. dissertation Management Sci. Info. Syst. Dept., Newark, NJ, Rutgers Univ
    • Y. Hong, "Privacy-preserving collaborative optimization," Ph.D. dissertation, Management Sci. Info. Syst. Dept., Newark, NJ, Rutgers Univ., 2013.
    • (2013) Privacy-preserving Collaborative Optimization
    • Hong, Y.1
  • 40
    • 84958534926 scopus 로고    scopus 로고
    • Collaboratively solving the traveling salesman problem with limited disclosure
    • Y. Hong, J. Vaidya, H. Lu, and L. Wang, "Collaboratively solving the traveling salesman problem with limited disclosure," in Proc. Conf. Data Appl. Security Privacy, 2014, pp. 179-194.
    • (2014) Proc. Conf. Data Appl. Security Privacy , pp. 179-194
    • Hong, Y.1    Vaidya, J.2    Lu, H.3    Wang, L.4
  • 41
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
    • Jan.
    • S. C. Pohlig and M. E. Hellman, "An improved algorithm for computing logarithms over GF(p) and its cryptographic significance," IEEE Trans. Inf. Theory, vol. IT-24, no. 1, pp. 106-110, Jan. 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.1 , pp. 106-110
    • Pohlig, S.C.1    Hellman, M.E.2
  • 42
    • 0036811662 scopus 로고    scopus 로고
    • K-anonymity: A model for protecting privacy
    • L. Sweeney, "k-anonymity: A model for protecting privacy," Int. J. Uncertain. Fuzziness Knowl.-Based Syst., vol. 10, no. 5, pp. 557-570, 2002.
    • (2002) Int. J. Uncertain. Fuzziness Knowl.-Based Syst. , vol.10 , Issue.5 , pp. 557-570
    • Sweeney, L.1
  • 43
    • 84903184001 scopus 로고    scopus 로고
    • A survey of privacy-aware supply chain collaboration: From theory to applications
    • Y. Hong, J. Vaidya, and S. Wang, "A survey of privacy-aware supply chain collaboration: From theory to applications," J. Inf. Syst., vol. 28, no. 1, pp. 243-268, 2014.
    • (2014) J. Inf. Syst. , vol.28 , Issue.1 , pp. 243-268
    • Hong, Y.1    Vaidya, J.2    Wang, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.