Please use this identifier to cite or link to this item:
http://cmuir.cmu.ac.th/jspui/handle/6653943832/68279
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Waranya Mahanan | en_US |
dc.contributor.author | W. Art Chaovalitwongse | en_US |
dc.contributor.author | Juggapong Natwichai | en_US |
dc.date.accessioned | 2020-04-02T15:24:14Z | - |
dc.date.available | 2020-04-02T15:24:14Z | - |
dc.date.issued | 2020-01-01 | en_US |
dc.identifier.issn | 18632394 | en_US |
dc.identifier.issn | 18632386 | en_US |
dc.identifier.other | 2-s2.0-85080892996 | en_US |
dc.identifier.other | 10.1007/s11761-020-00287-w | en_US |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85080892996&origin=inward | en_US |
dc.identifier.uri | http://cmuir.cmu.ac.th/jspui/handle/6653943832/68279 | - |
dc.description.abstract | © 2020, Springer-Verlag London Ltd., part of Springer Nature. Advancement in the Internet of Things (IoT) technologies makes life more convenient for people. Data sensed from the devices can be used for analyzing and responding to people’s needs seamlessly. An important consequence of such convenience is that privacy protection becomes a very important issue to be addressed effectively. Various data anonymization model has been proposed for such issue—one of the most widely applied models is the k-anonymity. The k-anonymity prevents the re-identification by replacing the input data with its more general form for transforming the data to have at least k identical tuples. In this paper, we focus on a special case of the input datasets which all the quasi-identifiers, the linkable attributes in the dataset, have identical data types, so-called identical generalization hierarchy (IGH). The solutions for such case will be applicable effectively to address the general IoT data privacy protection due to its data nature. We proposed a novel method to provide a globally optimized k-anonymity solution for the IGH datasets. The proposed algorithms determine an optimal solution based on the characteristics of the IGH data by visiting and evaluating only essential nodes of generalization lattice that satisfy the k-anonymity. Since the k-anonymization problem is an NP-hard, we show that our algorithm can efficiently find an optimal k-anonymity solutions with exploiting such special characteristics of the IGH data, i.e., the optimality between the nodes in different levels of generalization lattice. From the experimental results, it is obvious that our algorithm is much more efficient than the comparative algorithms by less searching on the given lattice. | en_US |
dc.subject | Business, Management and Accounting | en_US |
dc.subject | Computer Science | en_US |
dc.title | Data anonymization: a novel optimal k-anonymity algorithm for identical generalization hierarchy data in IoT | en_US |
dc.type | Journal | en_US |
article.title.sourcetitle | Service Oriented Computing and Applications | en_US |
article.stream.affiliations | University of Arkansas - Fayetteville | en_US |
article.stream.affiliations | Chiang Mai University | en_US |
Appears in Collections: | CMUL: Journal Articles |
Files in This Item:
There are no files associated with this item.
Items in CMUIR are protected by copyright, with all rights reserved, unless otherwise indicated.