Kim et al., 2019 - Google Patents
An anonymization protocol for continuous and dynamic privacy-preserving data collectionKim et al., 2019
- Document ID
- 14054669326689025133
- Author
- Kim S
- Chung Y
- Publication year
- Publication venue
- Future Generation Computer Systems
External Links
Snippet
Collecting personal data without privacy breaches is important to utilize distributed microdata. Privacy-preserving data collection is anonymizing personal data within the data transmission from data holders to a data collector without privacy breaches. A number of …
- 230000005540 biological transmission 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kim et al. | An anonymization protocol for continuous and dynamic privacy-preserving data collection | |
Onesimu et al. | An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services | |
Byun et al. | Secure anonymization for incremental datasets | |
Arava et al. | Adaptive k-anonymity approach for privacy preserving in cloud | |
Li et al. | (a, k)-Anonymous scheme for privacy-preserving data collection in IoT-based healthcare services systems | |
Jurczyk et al. | Distributed anonymization: Achieving privacy for both data subjects and data providers | |
Goswami et al. | Privacy preserving data publishing and data anonymization approaches: A review | |
Andrew et al. | Privacy preserving big data publication on cloud using mondrian anonymization techniques and deep neural networks | |
Yin et al. | An improved anonymity model for big data security based on clustering algorithm | |
Byun et al. | Privacy-preserving incremental data dissemination | |
Mascetti et al. | Spatial generalisation algorithms for LBS privacy preservation | |
Trivedi et al. | Parallel data stream anonymization methods: A review | |
Bewong et al. | A relative privacy model for effective privacy preservation in transactional data | |
Shastri et al. | Remodeling: improved privacy preserving data mining (PPDM) | |
Gangarde et al. | Data anonymization to balance privacy and utility of online social media network data | |
Rashid et al. | Privacy preserving data publishing | |
Xu et al. | Online anonymity for personalized web services | |
George et al. | Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud | |
El Haourani et al. | Knowledge Based Access Control a model for security and privacy in the Big Data | |
Yamaoka et al. | k-presence-secrecy: Practical privacy model as extension of k-anonymity | |
Mohamed et al. | A clustering approach for anonymizing distributed data streams | |
Livraga | Privacy in microdata release: Challenges, techniques, and approaches | |
Zigomitros et al. | The role of inference in the anonymization of medical records | |
Qamar et al. | EDAMS: Efficient Data Anonymization Model Selector for Privacy-Preserving Data Publishing. | |
Benkaouz et al. | Distributed privacy-preserving data aggregation via anonymization |