[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Sara Barakat 1 ; Bechara Al Bouna 1 ; Mohamed Nassar 2 and Christophe Guyeux 3

Affiliations: 1 Antonine University, Lebanon ; 2 MUBS, Lebanon ; 3 University of Bourgogne Franche-Comté, France

Keyword(s): Disassociation, Privacy Breach, Data Privacy, Set-valued, Privacy Preserving.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Information and Systems Security ; Personal Data Protection for Information Systems ; Privacy

Abstract: Data anonymization is gaining much attention these days as it provides the fundamental requirements to safely outsource datasets containing identifying information. While some techniques add noise to protect privacy others use generalization to hide the link between sensitive and non-sensitive information or separate the dataset into clusters to gain more utility. In the latter, often referred to as bucketization, data values are kept intact, only the link is hidden to maximize the utility. In this paper, we showcase the limits of disassociation, a bucketization technique that divides a set-valued dataset into km-anonymous clusters. We demonstrate that a privacy breach might occur if the disassociated dataset is subject to a cover problem. We finally evaluate the privacy breach using the quantitative privacy breach detection algorithm on real disassociated datasets.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 79.170.44.78

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Barakat, S. ; Al Bouna, B. ; Nassar, M. and Guyeux, C. (2016). On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets. In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - SECRYPT; ISBN 978-989-758-196-0; ISSN 2184-3236, SciTePress, pages 318-326. DOI: 10.5220/0005969403180326

@conference{secrypt16,
author={Sara Barakat and Bechara {Al Bouna} and Mohamed Nassar and Christophe Guyeux},
title={On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets},
booktitle={Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - SECRYPT},
year={2016},
pages={318-326},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005969403180326},
isbn={978-989-758-196-0},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - SECRYPT
TI - On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets
SN - 978-989-758-196-0
IS - 2184-3236
AU - Barakat, S.
AU - Al Bouna, B.
AU - Nassar, M.
AU - Guyeux, C.
PY - 2016
SP - 318
EP - 326
DO - 10.5220/0005969403180326
PB - SciTePress

<style> #socialicons>a span { top: 0px; left: -100%; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease-in-out; -o-transition: all 0.3s ease-in-out; -ms-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;} #socialicons>ahover div{left: 0px;} </style>