Please use this identifier to cite or link to this item:
http://cmuir.cmu.ac.th/jspui/handle/6653943832/52438
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Juggapong Natwichai | en_US |
dc.contributor.author | Xue Li | en_US |
dc.contributor.author | Asanee Kawtrkul | en_US |
dc.date.accessioned | 2018-09-04T09:25:18Z | - |
dc.date.available | 2018-09-04T09:25:18Z | - |
dc.date.issued | 2013-08-27 | en_US |
dc.identifier.issn | 17441773 | en_US |
dc.identifier.issn | 17441765 | en_US |
dc.identifier.other | 2-s2.0-84882601648 | en_US |
dc.identifier.other | 10.1504/IJICS.2013.055836 | en_US |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84882601648&origin=inward | en_US |
dc.identifier.uri | http://cmuir.cmu.ac.th/jspui/handle/6653943832/52438 | - |
dc.description.abstract | The emerging of the internet-based services poses a privacy threat to the individuals. Data transformation to meet a privacy standard becomes a requirement for typical data processing for the services. (k, e)-anonymisation is one of the most promising data transformation approaches, since it can provide high-accuracy aggregate query results. Though, the computational cost of the algorithm providing optimal solutions for such approach is not very high, i.e., O(n2). In certain environments, the data to be processed can be appended at any time. In this paper, we address an efficiency issue of the incremental privacy preservation using (k, e)-anonymisation approach. The impact of the increment is observed theoretically. We propose an incremental algorithm based on such observation. The algorithm can replace the quadratic-complexity processing by a linear function on some part of the dataset, while the optimal results are guaranteed. Additionally, a few indexes are proposed to further improve the efficiency of the proposed algorithm. The experiments have been conducted to validate our work. From the results, it can be seen that the proposed work is highly efficient comparing with the non-incremental algorithm and an approximation algorithm. © 2013 Inderscience Enterprises Ltd. | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Engineering | en_US |
dc.title | Incremental processing and indexing for (k, e)-anonymisation | en_US |
dc.type | Journal | en_US |
article.title.sourcetitle | International Journal of Information and Computer Security | en_US |
article.volume | 5 | en_US |
article.stream.affiliations | Chiang Mai University | en_US |
article.stream.affiliations | University of Queensland | en_US |
article.stream.affiliations | Kasetsart University | en_US |
Appears in Collections: | CMUL: Journal Articles |
Files in This Item:
There are no files associated with this item.
Items in CMUIR are protected by copyright, with all rights reserved, unless otherwise indicated.