A survey on privacy properties for data publishing of relational data

A Zigomitros, F Casino, A Solanas, C Patsakis - IEEE Access, 2020 - ieeexplore.ieee.org
Recent advances in telecommunications and database systems have allowed the scientific
community to efficiently mine vast amounts of information worldwide and to extract new …

MDDE: multitasking distributed differential evolution for privacy-preserving database fragmentation

YF Ge, M Orlowska, J Cao, H Wang, Y Zhang - The VLDB Journal, 2022 - Springer
Database fragmentation has been used as a protection mechanism of database's privacy by
allocating attributes with sensitive associations into separate data fragments. A typical …

Distributed memetic algorithm for outsourced database fragmentation

YF Ge, WJ Yu, J Cao, H Wang, ZH Zhan… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Data privacy and utility are two essential requirements in outsourced data storage.
Traditional techniques for sensitive data protection, such as data encryption, affect the …

Knowledge transfer-based distributed differential evolution for dynamic database fragmentation

YF Ge, M Orlowska, J Cao, H Wang, Y Zhang - Knowledge-Based Systems, 2021 - Elsevier
Database fragmentation can protect the distributed database's privacy by dividing attributes
of sensitive associations into different fragments. Previous database fragmentation …

Set-based adaptive distributed differential evolution for anonymity-driven database fragmentation

YF Ge, J Cao, H Wang, Z Chen, Y Zhang - Data Science and Engineering, 2021 - Springer
By breaking sensitive associations between attributes, database fragmentation can protect
the privacy of outsourced data storage. Database fragmentation algorithms need prior …

[PDF][PDF] k-Anonymity: From Theory to Applications.

SDC di Vimercati, S Foresti, G Livraga… - Trans. Data Priv., 2023 - spdp.di.unimi.it
k-Anonymity is a well-known privacy model originally designed to protect the identities of the
individuals involved in the release of a data collection. It provides a privacy requirement and …

Data confidentiality and information credibility in on-line ecosystems

G Livraga, M Viviani - Proceedings of the 11th international conference …, 2019 - dl.acm.org
Recent ICTs paradigms such as cloud computing, data outsourcing, digital data markets,
and the spread of multiple social media based on Web 2.0 technologies, facilitate the …

Scalable distributed data anonymization for large datasets

SDC di Vimercati, D Facchinetti… - … Transactions on Big …, 2022 - ieeexplore.ieee.org
-Anonymity and-diversity are two well-known privacy metrics that guarantee protection of the
respondents of a dataset by obfuscating information that can disclose their identities and …

Distributed differential evolution for anonymity-driven vertical fragmentation in outsourced data storage

YF Ge, J Cao, H Wang, Y Zhang, Z Chen - Web Information Systems …, 2020 - Springer
Vertical fragmentation is a promising technique for outsourced data storage. It can protect
data privacy while conserving original data without any transformation. Previous vertical …

A benefit-driven genetic algorithm for balancing privacy and utility in database fragmentation

YF Ge, J Cao, H Wang, J Yin, WJ Yu, ZH Zhan… - Proceedings of the …, 2019 - dl.acm.org
In outsourcing data storage, privacy and utility are significant concerns. Techniques such as
data encryption can protect the privacy of sensitive information but affect the efficiency of …