메뉴 건너뛰기




Volumn 2, Issue 1, 2008, Pages 4-26

Privacy preserving data obfuscation for inherently clustered data

Author keywords

Anonymity; Collaborative filtering; Data obfuscation; Data perturbation; Data randomisation; Information and computer security; Privacy; Privacy preserving data mining

Indexed keywords

DATA MINING; DATA PROCESSING; INTELLIGENT SYSTEMS; INTRUSION DETECTION; SEARCH ENGINES;

EID: 85047227272     PISSN: 17441765     EISSN: 17441773     Source Type: Journal    
DOI: 10.1504/IJICS.2008.016819     Document Type: Article
Times cited : (30)

References (27)
  • 3
    • 10944251971 scopus 로고    scopus 로고
    • Data obfuscation: Anonymity and desensitization of usable data sets
    • November-December
    • Bakken, D., Parameswaran, R. and Blough, D. (2004) 'Data obfuscation: anonymity and desensitization of usable data sets', IEEE Security and Privacy, November-December, Vol. 2, No. 6, pp.34-41.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.6 , pp. 34-41
    • Bakken, D.1    Parameswaran, R.2    Blough, D.3
  • 4
    • 0347432367 scopus 로고    scopus 로고
    • Information preserving statistical obfuscation
    • Burridge, J. (2003) 'Information preserving statistical obfuscation', Statistics and Computing, pp. 321-327.
    • (2003) Statistics and Computing , pp. 321-327
    • Burridge, J.1
  • 7
    • 0018442066 scopus 로고
    • The tracker a threat to statistical database security
    • Denning, D. and Schwartz, M. (1979) 'The tracker a threat to statistical database security', ACM Transactions on Database Systems, Vol. 4, pp.76-96.
    • (1979) ACM Transactions on Database Systems , vol.4 , pp. 76-96
    • Denning, D.1    Schwartz, M.2
  • 9
    • 84972531331 scopus 로고
    • Data-swapping variation on a theme by Dalenius and Reiss enhancing access to microdata while protecting confidentiality
    • Duncan, G.T. and Pearson, R.W. (1991) 'Data-swapping variation on a theme by Dalenius and Reiss enhancing access to microdata while protecting confidentiality', Prospects for Future Statistical Science Vol. 6, pp.219-232.
    • (1991) Prospects for Future Statistical Science , vol.6 , pp. 219-232
    • Duncan, G.T.1    Pearson, R.W.2
  • 10
    • 84958048324 scopus 로고    scopus 로고
    • Data swapping: Balancing privacy against mining of association rules
    • Florence, Italy, August, pp
    • Estivill-Castro, V. and Brankovic, L. (1999) 'Data swapping: Balancing privacy against mining of association rules', Proc. of Knowledge Discovery and Data Warehousing, Florence, Italy, August, pp.389-398.
    • (1999) Proc. of Knowledge Discovery and Data Warehousing , pp. 389-398
    • Estivill-Castro, V.1    Brankovic, L.2
  • 11
    • 1142263341 scopus 로고    scopus 로고
    • Limiting privacy breaches in privacy preserving data mining
    • San Diego, California, June
    • Evfimievski, A., Gehrke, J. and Srikant, R. (2003) 'Limiting privacy breaches in privacy preserving data mining', Principles of Database Systems, San Diego, California, June.
    • (2003) Principles of Database Systems
    • Evfimievski, A.1    Gehrke, J.2    Srikant, R.3
  • 12
    • 30444457986 scopus 로고    scopus 로고
    • Distortion measures for categorical data swapping
    • Technical Report 131, US National Institute for Statistical Sciences, January
    • Gomatam, S. and Karr, A. (2003) 'Distortion measures for categorical data swapping', Technical Report 131, US National Institute for Statistical Sciences, January.
    • (2003)
    • Gomatam, S.1    Karr, A.2
  • 17
    • 10944249990 scopus 로고    scopus 로고
    • Controlled data-swapping techniques for masking public use microdata sets
    • 96-04, US Bureau of the Census
    • Moore, R. (1996) 'Controlled data-swapping techniques for masking public use microdata sets', SRD Report RR 96-04, US Bureau of the Census.
    • (1996) SRD Report RR
    • Moore, R.1
  • 18
    • 36348942791 scopus 로고
    • Chebyshev solution of n+1 linear equations in n unknowns
    • July, pp
    • Moursmund, D. (1965) 'Chebyshev solution of n+1 linear equations in n unknowns', Journal of the ACM, Vol. 12, July, pp.383-387.
    • (1965) Journal of the ACM , vol.12 , pp. 383-387
    • Moursmund, D.1
  • 19
    • 85086420102 scopus 로고    scopus 로고
    • Disclosure risk and data utility characteri s tics of data swapping: A preliminary investigation
    • May, pp
    • Muralidhar, K. and Sarathy, R. (2003) 'Disclosure risk and data utility characteri s tics of data swapping: A preliminary investigation', IEEE Security and Privacy, Vol. 1, May, pp. 18-23.
    • (2003) IEEE Security and Privacy , vol.1 , pp. 18-23
    • Muralidhar, K.1    Sarathy, R.2
  • 20
    • 14244260513 scopus 로고    scopus 로고
    • Privacy preserving clustering by data transformation
    • Manaus, Brazil, October, pp
    • Oliveira, S. and Zaane, O. (2003) 'Privacy preserving clustering by data transformation', Proc. of the 18th Brazilian Symposium on Databases Manaus, Brazil, October, pp.304-318.
    • (2003) Proc. of the 18th Brazilian Symposium on Databases , pp. 304-318
    • Oliveira, S.1    Zaane, O.2
  • 21
    • 85086419253 scopus 로고    scopus 로고
    • Oliveira, S. and Zaane, O. (2004) 'Achieving privacy preservation when sharing data for clustering', Workshop on Secure Data Management in conjunction with VLDB2004, Toronto, Canada: Springer Verlag, August, LNCS 3178.
    • Oliveira, S. and Zaane, O. (2004) 'Achieving privacy preservation when sharing data for clustering', Workshop on Secure Data Management in conjunction with VLDB2004, Toronto, Canada: Springer Verlag, August, LNCS 3178.
  • 23
    • 0021389555 scopus 로고
    • Practical data-swapping the first steps
    • March, pp
    • Reiss, S.P. (1984) 'Practical data-swapping the first steps', ACM Transactions on Database Systems, Vol. 9, March, pp.20-37.
    • (1984) ACM Transactions on Database Systems , vol.9 , pp. 20-37
    • Reiss, S.P.1
  • 24
    • 85086419650 scopus 로고    scopus 로고
    • Rivest, R., Adleman, L. and Dertouzas, M. (1978) 'On data banks and privacy homomorphisms', in R.A.D. et al. (Eds.) Foundations of Secure Computations, Academic Press, pp. 169-179.
    • Rivest, R., Adleman, L. and Dertouzas, M. (1978) 'On data banks and privacy homomorphisms', in R.A.D. et al. (Eds.) Foundations of Secure Computations, Academic Press, pp. 169-179.
  • 26
    • 0016082639 scopus 로고
    • Bibliography on estimation of misclassification
    • July
    • Toussaint, G. (1974) 'Bibliography on estimation of misclassification', IEEE Transactions on Information Theory, July, Vol. 20, No. 4, pp.472-479.
    • (1974) IEEE Transactions on Information Theory , vol.20 , Issue.4 , pp. 472-479
    • Toussaint, G.1
  • 27
    • 4344650051 scopus 로고    scopus 로고
    • Using simulated annealing for k-anonymity
    • US Census Bureau
    • Winkler, W. (2002) 'Using simulated annealing for k-anonymity', Research Report Series, US Census Bureau.
    • (2002) Research Report Series
    • Winkler, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.