A survey on privacy properties for data publishing of relational data
Recent advances in telecommunications and database systems have allowed the scientific
community to efficiently mine vast amounts of information worldwide and to extract new …
community to efficiently mine vast amounts of information worldwide and to extract new …
MDDE: multitasking distributed differential evolution for privacy-preserving database fragmentation
Database fragmentation has been used as a protection mechanism of database's privacy by
allocating attributes with sensitive associations into separate data fragments. A typical …
allocating attributes with sensitive associations into separate data fragments. A typical …
Distributed memetic algorithm for outsourced database fragmentation
Data privacy and utility are two essential requirements in outsourced data storage.
Traditional techniques for sensitive data protection, such as data encryption, affect the …
Traditional techniques for sensitive data protection, such as data encryption, affect the …
Knowledge transfer-based distributed differential evolution for dynamic database fragmentation
Database fragmentation can protect the distributed database's privacy by dividing attributes
of sensitive associations into different fragments. Previous database fragmentation …
of sensitive associations into different fragments. Previous database fragmentation …
Set-based adaptive distributed differential evolution for anonymity-driven database fragmentation
By breaking sensitive associations between attributes, database fragmentation can protect
the privacy of outsourced data storage. Database fragmentation algorithms need prior …
the privacy of outsourced data storage. Database fragmentation algorithms need prior …
[PDF][PDF] k-Anonymity: From Theory to Applications.
k-Anonymity is a well-known privacy model originally designed to protect the identities of the
individuals involved in the release of a data collection. It provides a privacy requirement and …
individuals involved in the release of a data collection. It provides a privacy requirement and …
Data confidentiality and information credibility in on-line ecosystems
Recent ICTs paradigms such as cloud computing, data outsourcing, digital data markets,
and the spread of multiple social media based on Web 2.0 technologies, facilitate the …
and the spread of multiple social media based on Web 2.0 technologies, facilitate the …
Scalable distributed data anonymization for large datasets
-Anonymity and-diversity are two well-known privacy metrics that guarantee protection of the
respondents of a dataset by obfuscating information that can disclose their identities and …
respondents of a dataset by obfuscating information that can disclose their identities and …
Distributed differential evolution for anonymity-driven vertical fragmentation in outsourced data storage
Vertical fragmentation is a promising technique for outsourced data storage. It can protect
data privacy while conserving original data without any transformation. Previous vertical …
data privacy while conserving original data without any transformation. Previous vertical …
A benefit-driven genetic algorithm for balancing privacy and utility in database fragmentation
In outsourcing data storage, privacy and utility are significant concerns. Techniques such as
data encryption can protect the privacy of sensitive information but affect the efficiency of …
data encryption can protect the privacy of sensitive information but affect the efficiency of …