Anonoymizing Methods against Republication of Incremental Numerical Sensitive Data

2011 ◽  
Vol 267 ◽  
pp. 499-503
Author(s):  
Xiao Lin Zhang ◽  
Jie Yu ◽  
Yue Sheng Tan ◽  
Li Xin Liu

Privacy protection for numerical sensitive data has become a serious concerned in many applications. Current privacy protection for numerical sensitive data base on the static datasets. However, most of the real world data sources are dynamic, and the direct application of the existing static datasets privacy preserving techniques often causes the unexpected private information disclosure. This paper anaylisis various leakage risks of republication of incremental numerical sensitive data on numerical sensitive data, and proposes an efficient algorithm on anonoymizing methods against republication of incremental numerical sensitive data,The experiments show that this method protects privacy adequately.

2018 ◽  
Vol 21 ◽  
pp. S475
Author(s):  
S. Mokiou ◽  
Z. Hakimi ◽  
J. Wang-Silvanto ◽  
S. Horsburgh ◽  
S. Chadda

2015 ◽  
Author(s):  
Martin G. Skjjveland ◽  
Martin Giese ◽  
Dag Hovland ◽  
Espen H. Lian ◽  
Arild Waaler

2015 ◽  
Vol 18 (3) ◽  
pp. A20
Author(s):  
M. Gavaghan ◽  
S. Armstrong ◽  
C. Taggart ◽  
S. Garfield

Author(s):  
Lynne T. Penberthy ◽  
Donna R. Rivera ◽  
Jennifer L. Lund ◽  
Melissa A. Bruno ◽  
Anne‐Marie Meyer

Author(s):  
Florian Kerschbaum

Collaborative business applications are an active field of research and an emerging practice in industry. This chapter will focus on data protection in b2b applications which offer a wide range of business models and architecture, since often equal partners are involved in the transactions. It will present three distinct applications, their business models, security requirements and the newest solutions for solving these problems. The three applications are collaborative benchmarking, fraud detection and supply chain management. Many of these applications will not be realized if no appropriate measure for protecting the collaborating parties’ data are taken. This chapter focuses on the strongest form of data protection. The business secrets are kept entirely secret from other parties (or at least to the degree possible). This also corresponds to the strongest form of privacy protection in many instances. The private information does not leave the producing system, (i.e., data protection), such that the information producer remains its sole owner. In case of B2B application, the sensitive data are usually business secrets, and not personally identifiable data as in privacy protection.


Sign in / Sign up

Export Citation Format

Share Document