Please use this identifier to cite or link to this item:
http://cmuir.cmu.ac.th/jspui/handle/6653943832/76363
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Waranya Mahanan | en_US |
dc.contributor.author | Juggapong Natwichai | en_US |
dc.date.accessioned | 2022-10-16T07:08:44Z | - |
dc.date.available | 2022-10-16T07:08:44Z | - |
dc.date.issued | 2021-01-01 | en_US |
dc.identifier.issn | 23674520 | en_US |
dc.identifier.issn | 23674512 | en_US |
dc.identifier.other | 2-s2.0-85102036092 | en_US |
dc.identifier.other | 10.1007/978-3-030-70639-5_23 | en_US |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85102036092&origin=inward | en_US |
dc.identifier.uri | http://cmuir.cmu.ac.th/jspui/handle/6653943832/76363 | - |
dc.description.abstract | In the data bursting era, an enormous amount of data can be collected. Though, such data can benefit both the data owners and the public, the privacy of collected data is an important concern. To guarantee the privacy of data, the k-anonymous method is applied before publishing the dataset. The dataset needs to have an identical value of at least k records in order to protect the data privacy which could cause data losses. The optimal k-anonymity is concerned with minimizing the data losses and also preserve data privacy. The generalization lattice is created to map all the generalization schemes and use them to find the optimal answer. The larger number of attributes means the larger number of nodes in the generalization lattice. Thus, in the larger number of attributes, the k-anonymous algorithm takes more computation resources and time to determine the answer. Although, due to the limited computation resources and time, the existing optimal k-anonymity algorithms only find the optimal answer on the small dataset. Therefore, in this paper, we design the optimal k-anonymity algorithm with the incremental attribute concept. At m attribute, our algorithm process only the nodes which previously satisfy the k-anonymity from the m- 1 attributes. Thus, our algorithm can find the optimal answer at a large number of attributes without reaching the memory limit problem compared with the existing k-anonymity algorithms due to it determines only some necessary nodes in the lattice. | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Engineering | en_US |
dc.title | Data Privacy Preservation Algorithm on Large-Scale Identical Generalization Hierarchy Data | en_US |
dc.type | Book Series | en_US |
article.title.sourcetitle | Lecture Notes on Data Engineering and Communications Technologies | en_US |
article.volume | 65 | en_US |
article.stream.affiliations | Chiang Mai University | en_US |
Appears in Collections: | CMUL: Journal Articles |
Files in This Item:
There are no files associated with this item.
Items in CMUIR are protected by copyright, with all rights reserved, unless otherwise indicated.