Practical data-swapping: the first steps
ACM Transactions on Database Systems (TODS)
The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
Chebyshev Solution of n+1 Linear Equations in n + 1nUnknowns
Journal of the ACM (JACM)
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Digital Image Processing
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Information preserving statistical obfuscation
Statistics and Computing
Data Obfuscation: Anonymity and Desensitization of Usable Data Sets
IEEE Security and Privacy
On the complexity of optimal K-anonymity
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
A robust data obfuscation approach for privacy preserving collaborative filtering
A robust data obfuscation approach for privacy preserving collaborative filtering
Clustering-oriented privacy-preserving data publishing
Knowledge-Based Systems
Hi-index | 0.00 |
Privacy is defined as the freedom from unauthorised intrusion. The availability of public records along with intelligent search engines and data mining tools allow easy access to useful information. They also serve as a haven for individuals with malicious intent. This paper proposes an approach that protects the privacy of individual records while retaining the information content. The techniques that have been proposed for privacy protection so far either provide insufficient privacy or too much useful information on account of privacy protection. This paper proposes an attack model to analyse the different types of privacy breaches, proposes a set of properties for good privacy protection, proposes a robust data protection technique, and compares the privacy and usability properties of the new technique with some of the existing techniques.