{"title":"基于k -隐藏的云分布式匿名化","authors":"Salheddine Kabou, Sidi Mohamed Benslimane","doi":"10.1109/IWAISE.2014.11","DOIUrl":null,"url":null,"abstract":"There is a growing interest in cloud computing due to its various benefits such as the sharing of computing resources and the data containing personal information across multiple distributed and private databases. However, privacy and security concerns are among the main obstacles facing the widespread adoption of this new technology. Data Economization makes data worthless to anyone except the owner of the data. It is one of the methods for transforming the data in such a way that it prevents identification of key information from an unauthorized person. Most of the existing works use a k-anonym at model for preserving privacy for data subject that offers lower utility. Motivated by this, we develop a new distributed anonymization protocol to satisfy multiple data providers privacy requirements based on a k-concealment model that offers a higher utility.","PeriodicalId":132918,"journal":{"name":"2014 International Workshop on Advanced Information Systems for Enterprises","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"K-concealment based Distributed Anonymization for the Cloud\",\"authors\":\"Salheddine Kabou, Sidi Mohamed Benslimane\",\"doi\":\"10.1109/IWAISE.2014.11\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There is a growing interest in cloud computing due to its various benefits such as the sharing of computing resources and the data containing personal information across multiple distributed and private databases. However, privacy and security concerns are among the main obstacles facing the widespread adoption of this new technology. Data Economization makes data worthless to anyone except the owner of the data. It is one of the methods for transforming the data in such a way that it prevents identification of key information from an unauthorized person. Most of the existing works use a k-anonym at model for preserving privacy for data subject that offers lower utility. Motivated by this, we develop a new distributed anonymization protocol to satisfy multiple data providers privacy requirements based on a k-concealment model that offers a higher utility.\",\"PeriodicalId\":132918,\"journal\":{\"name\":\"2014 International Workshop on Advanced Information Systems for Enterprises\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Workshop on Advanced Information Systems for Enterprises\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IWAISE.2014.11\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Workshop on Advanced Information Systems for Enterprises","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWAISE.2014.11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
K-concealment based Distributed Anonymization for the Cloud
There is a growing interest in cloud computing due to its various benefits such as the sharing of computing resources and the data containing personal information across multiple distributed and private databases. However, privacy and security concerns are among the main obstacles facing the widespread adoption of this new technology. Data Economization makes data worthless to anyone except the owner of the data. It is one of the methods for transforming the data in such a way that it prevents identification of key information from an unauthorized person. Most of the existing works use a k-anonym at model for preserving privacy for data subject that offers lower utility. Motivated by this, we develop a new distributed anonymization protocol to satisfy multiple data providers privacy requirements based on a k-concealment model that offers a higher utility.