Paper Title:
Anonoymizing Methods against Republication of Incremental Numerical Sensitive Data
  Abstract

Privacy protection for numerical sensitive data has become a serious concerned in many applications. Current privacy protection for numerical sensitive data base on the static datasets. However, most of the real world data sources are dynamic, and the direct application of the existing static datasets privacy preserving techniques often causes the unexpected private information disclosure. This paper anaylisis various leakage risks of republication of incremental numerical sensitive data on numerical sensitive data, and proposes an efficient algorithm on anonoymizing methods against republication of incremental numerical sensitive data,The experiments show that this method protects privacy adequately.

  Info
Periodical
Edited by
Yanwen Wu
Pages
499-503
DOI
10.4028/www.scientific.net/AMR.267.499
Citation
X. L. Zhang, J. Yu, Y. S. Tan, L. X. Liu, "Anonoymizing Methods against Republication of Incremental Numerical Sensitive Data", Advanced Materials Research, Vol. 267, pp. 499-503, 2011
Online since
June 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Zhong Ping Zhang, Yong Xin Liang
Abstract:This paper proposes a new data stream outlier detection algorithm SODRNN based on reverse nearest neighbors. We deal with the sliding window...
1032
Authors: Bing Chen, Xue Qin Hu, Bei Zhan Wang, Yin Huan Zheng
Chapter 5: Biotechnology, Chemical and Materials Engineering
Abstract:This paper proposed a new hybrid spectral clustering algorithm in which Mean Impact Value (MIV) was used in the cost dimension reduction. The...
695
Authors: Dan Dan Yuan, Hai Ning Tu, Guo Ping Liu
Chapter 2: Manufacturing and Design Science
Abstract:This paper elaborates on all kinds of existing methods of computing profile error, on account of integrated comparison of all good and bad...
2183
  | Authors: Jun Jie Liang, Wei Zhan
Chapter 1: Computer Science and Theory, Related Studies
Abstract:This paper researches methods used by relational database management systems to manage LOBs. It attempts to use LOB slave table methods to...
58
Authors: Jia Jia Miao, Guo You Chen, Kai Du, Xue Lin Fang
Chapter 13: Internet and E-Commerce Technology
Abstract:The increasing number of applications for large data, such as Web search engines, we need to have high availability 7*24 tracking, storage...
2792