Big healthcare data: preserving security and privacy

K Abouelmehdi, A Beni-Hessane, H Khaloufi - Journal of big data, 2018 - Springer
Big data has fundamentally changed the way organizations manage, analyze and leverage
data in any industry. One of the most promising fields where big data can be applied to make …

Big data privacy: a technological perspective and review

P Jain, M Gyanchandani, N Khare - Journal of Big Data, 2016 - Springer
Big data is a term used for very large data sets that have more varied and complex structure.
These characteristics usually correlate with additional difficulties in storing, analyzing and …

[HTML][HTML] Estimating the success of re-identifications in incomplete datasets using generative models

L Rocher, JM Hendrickx, YA De Montjoye - Nature communications, 2019 - nature.com
While rich medical, behavioral, and socio-demographic data are key to modern data-driven
research, their collection and use raise legitimate privacy concerns. Anonymizing datasets …

Data Mining The Text Book

C Aggarwal - 2015 - Springer
This textbook explores the different aspects of data mining from the fundamentals to the
complex data types and their applications, capturing the wide diversity of problem domains …

Next place prediction using mobility markov chains

S Gambs, MO Killijian… - Proceedings of the first …, 2012 - dl.acm.org
In this paper, we address the issue of predicting the next location of an individual based on
the observations of his mobility behavior over some period of time and the recent locations …

L-diversity: Privacy beyond k-anonymity

A Machanavajjhala, D Kifer, J Gehrke… - Acm transactions on …, 2007 - dl.acm.org
Publishing data about individuals without revealing sensitive information about them is an
important problem. In recent years, a new definition of privacy called k-anonymity has …

t-closeness: Privacy beyond k-anonymity and l-diversity

N Li, T Li, S Venkatasubramanian - 2007 IEEE 23rd …, 2006 - ieeexplore.ieee.org
The k-anonymity privacy requirement for publishing microdata requires that each
equivalence class (ie, a set of records that are indistinguishable from each other with respect …

Privacy-preserving data publishing: A survey of recent developments

BCM Fung, K Wang, R Chen, PS Yu - ACM Computing Surveys (Csur), 2010 - dl.acm.org
The collection of digital information by governments, corporations, and individuals has
created tremendous opportunities for knowledge-and information-based decision making …

[LIVRE][B] A general survey of privacy-preserving data mining models and algorithms

CC Aggarwal, PS Yu - 2008 - Springer
In recent years, privacy-preserving data mining has been studied extensively, because of
the wide proliferation of sensitive information on the internet. A number of algorithmic …

Data privacy through optimal k-anonymization

RJ Bayardo, R Agrawal - 21st International conference on data …, 2005 - ieeexplore.ieee.org
Data de-identification reconciles the demand for release of data for research purposes and
the demand for privacy from individuals. This paper proposes and evaluates an optimization …