Investigation on privacy preserving using K-anonymity techniques

BS Kumar, T Daniya, N Sathya…�- …�and Informatics (ICCCI), 2020 - ieeexplore.ieee.org
… [2] BB Patil and AJ Patankar, "Multidimensional kanonymity for protecting privacy using
nearest neighborhood strategy," 2013 IEEE International Conference on Computational …

[HTML][HTML] Data privacy preservation algorithm with k-anonymity

W Mahanan, WA Chaovalitwongse, J Natwichai�- World Wide Web, 2021 - Springer
… all generalization schemes in the k-anonymity method, for determining the optimal k-anonymity
solution. The generalization schemes which satisfy the k-anonymity and loss minimal …

Adaptive k-Anonymity Approach for Privacy Preserving in Cloud

K Arava, S Lingamgunta�- Arabian Journal for Science and Engineering, 2020 - Springer
… Third is privacy by cryptography that uses algorithms such as attribute-based … k-anonymity
as the privacy model in our study owing to the fact that every model is susceptible to privacy

A Personalized (α, β, l, k)‐Anonymity Model of Social Network for Protecting Privacy

X Ren, D Jiang�- Wireless Communications and Mobile�…, 2022 - Wiley Online Library
protecting privacy requirements can be met by using such … RT is said to satisfy k-anonymity
if and only if each sequence … Table 1 is said to satisfy k-anonymity, QI RT includes nation, …

A new privacy protection approach based on k-anonymity for location-based cloud services

T Wang, L Xu, M Zhang, H Zhang…�- Journal of Circuits�…, 2022 - World Scientific
… This paper introduces a privacy protection method based on K-anonymity, which takes into
account the users' location privacy protection and query privacy protection. The proposed …

[HTML][HTML] A trusted de-swinging k-anonymity scheme for location privacy protection

M Yang, B Ye, Y Chen, T Li, Y Yang, X Qian…�- Journal of Cloud�…, 2022 - Springer
Using k-anonymity, the attacker cannot correlate the query information of the requesting …
[11] propose the first distributed k-anonymity scheme. To make k-anonymity more practically, …

Reidentification Risk in Panel Data: Protecting for k-Anonymity

S Li, MJ Schneider, Y Yu…�- Information Systems�…, 2023 - pubsonline.informs.org
… To protect the privacy of panelists, we consider the well-known privacy notion of k-anonymity
and develop a new approach called graph-based minimum movement k-anonymization (k-…

Balancing data utility versus information loss in data-privacy protection using k-anonymity

TK Esmeel, MM Hasan, MN Kabir…�- 2020 IEEE 8th�…, 2020 - ieeexplore.ieee.org
privacy technique, k-anonymity for different values of k on different number c of columns of
the dataset. Next, the information loss due to k-anonymity … be used for kanonymity algorithm to …

[HTML][HTML] Privacy preservation in online social networks using multiple-graph-properties-based clustering to ensure k-anonymity, l-diversity, and t-closeness

R Gangarde, A Sharma, A Pawar, R Joshi, S Gonge�- Electronics, 2021 - mdpi.com
… reliable cluster formation with high-level privacy protection. After forming the clusters that
provide k-anonymity, we apply the post-processing on each cluster using a one-pass algorithm. …

Multi-level privacy preserving k-anonymity

JH Weng, PW Chi�- 2021 16th Asia Joint Conference on�…, 2021 - ieeexplore.ieee.org
… In this paper, we introduce an enhanced protection model based on k-anonymity, which
allows data publishers to customize multiple privacy constraints for each record. Moreover, we …