Please use this identifier to cite or link to this item:
http://cmuir.cmu.ac.th/jspui/handle/6653943832/76240
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Waranya Mahanan | en_US |
dc.contributor.author | W. Art Chaovalitwongse | en_US |
dc.contributor.author | Juggapong Natwichai | en_US |
dc.date.accessioned | 2022-10-16T07:07:20Z | - |
dc.date.available | 2022-10-16T07:07:20Z | - |
dc.date.issued | 2021-09-01 | en_US |
dc.identifier.issn | 15731413 | en_US |
dc.identifier.issn | 1386145X | en_US |
dc.identifier.other | 2-s2.0-85111490425 | en_US |
dc.identifier.other | 10.1007/s11280-021-00922-2 | en_US |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85111490425&origin=inward | en_US |
dc.identifier.uri | http://cmuir.cmu.ac.th/jspui/handle/6653943832/76240 | - |
dc.description.abstract | With growing concern of data privacy violations, privacy preservation processes become more intense. The k-anonymity method, a widely applied technique, transforms the data such that the publishing datasets must have at least k tuples to have the same link-able attribute, quasi-identifiers, values. From the observations, we found that, in a certain domain, all quasi-identifiers of the datasets, can have the same data type. This type of attribute is considered as an Identical Generalization Hierarchy (IGH) data. An IGH data has a particular set of characteristics that could utilize for enhancing the efficiency of heuristic privacy preservation algorithms. In this paper, we propose a data privacy preservation heuristic algorithm on IGH data. The algorithm is developed from the observations on the anonymous property of the problem structure that can eliminate the privacy constraints consideration. The experiment results are presented that the proposed algorithm could effectively preserve data privacy and also reduce the number of visited nodes for ensuring the privacy protection, which is the most time-consuming process, compared to the most efficient existing algorithm by at most 21%. | en_US |
dc.subject | Computer Science | en_US |
dc.title | Data privacy preservation algorithm with k-anonymity | en_US |
dc.type | Journal | en_US |
article.title.sourcetitle | World Wide Web | en_US |
article.volume | 24 | en_US |
article.stream.affiliations | University of Arkansas | en_US |
article.stream.affiliations | Chiang Mai University | en_US |
Appears in Collections: | CMUL: Journal Articles |
Files in This Item:
There are no files associated with this item.
Items in CMUIR are protected by copyright, with all rights reserved, unless otherwise indicated.