Investigation on privacy preserving using K-anonymity techniques
BS Kumar, T Daniya, N Sathya…�- …�and Informatics (ICCCI), 2020 - ieeexplore.ieee.org
… [2] BB Patil and AJ Patankar, "Multidimensional kanonymity for protecting privacy using
nearest neighborhood strategy," 2013 IEEE International Conference on Computational …
nearest neighborhood strategy," 2013 IEEE International Conference on Computational …
[HTML][HTML] Data privacy preservation algorithm with k-anonymity
W Mahanan, WA Chaovalitwongse, J Natwichai�- World Wide Web, 2021 - Springer
… all generalization schemes in the k-anonymity method, for determining the optimal k-anonymity
solution. The generalization schemes which satisfy the k-anonymity and loss minimal …
solution. The generalization schemes which satisfy the k-anonymity and loss minimal …
Adaptive k-Anonymity Approach for Privacy Preserving in Cloud
K Arava, S Lingamgunta�- Arabian Journal for Science and Engineering, 2020 - Springer
… Third is privacy by cryptography that uses algorithms such as attribute-based … k-anonymity
as the privacy model in our study owing to the fact that every model is susceptible to privacy …
as the privacy model in our study owing to the fact that every model is susceptible to privacy …
A Personalized (α, β, l, k)‐Anonymity Model of Social Network for Protecting Privacy
X Ren, D Jiang�- Wireless Communications and Mobile�…, 2022 - Wiley Online Library
… protecting privacy requirements can be met by using such … RT is said to satisfy k-anonymity
if and only if each sequence … Table 1 is said to satisfy k-anonymity, QI RT includes nation, …
if and only if each sequence … Table 1 is said to satisfy k-anonymity, QI RT includes nation, …
A new privacy protection approach based on k-anonymity for location-based cloud services
T Wang, L Xu, M Zhang, H Zhang…�- Journal of Circuits�…, 2022 - World Scientific
… This paper introduces a privacy protection method based on K-anonymity, which takes into
account the users' location privacy protection and query privacy protection. The proposed …
account the users' location privacy protection and query privacy protection. The proposed …
[HTML][HTML] A trusted de-swinging k-anonymity scheme for location privacy protection
… Using k-anonymity, the attacker cannot correlate the query information of the requesting …
[11] propose the first distributed k-anonymity scheme. To make k-anonymity more practically, …
[11] propose the first distributed k-anonymity scheme. To make k-anonymity more practically, …
Reidentification Risk in Panel Data: Protecting for k-Anonymity
… To protect the privacy of panelists, we consider the well-known privacy notion of k-anonymity
and develop a new approach called graph-based minimum movement k-anonymization (k-…
and develop a new approach called graph-based minimum movement k-anonymization (k-…
Balancing data utility versus information loss in data-privacy protection using k-anonymity
… privacy technique, k-anonymity for different values of k on different number c of columns of
the dataset. Next, the information loss due to k-anonymity … be used for kanonymity algorithm to …
the dataset. Next, the information loss due to k-anonymity … be used for kanonymity algorithm to …
[HTML][HTML] Privacy preservation in online social networks using multiple-graph-properties-based clustering to ensure k-anonymity, l-diversity, and t-closeness
… reliable cluster formation with high-level privacy protection. After forming the clusters that
provide k-anonymity, we apply the post-processing on each cluster using a one-pass algorithm. …
provide k-anonymity, we apply the post-processing on each cluster using a one-pass algorithm. …
Multi-level privacy preserving k-anonymity
JH Weng, PW Chi�- 2021 16th Asia Joint Conference on�…, 2021 - ieeexplore.ieee.org
… In this paper, we introduce an enhanced protection model based on k-anonymity, which
allows data publishers to customize multiple privacy constraints for each record. Moreover, we …
allows data publishers to customize multiple privacy constraints for each record. Moreover, we …