Please use this identifier to cite or link to this item: http://cmuir.cmu.ac.th/jspui/handle/6653943832/52452
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBowonsak Srisungsittisuntien_US
dc.contributor.authorJuggapong Natwichaien_US
dc.date.accessioned2018-09-04T09:25:28Z-
dc.date.available2018-09-04T09:25:28Z-
dc.date.issued2013-01-01en_US
dc.identifier.other2-s2.0-84893299608en_US
dc.identifier.other10.1109/NBiS.2013.18en_US
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84893299608&origin=inwarden_US
dc.identifier.urihttp://cmuir.cmu.ac.th/jspui/handle/6653943832/52452-
dc.description.abstractCollaboration between business partners have become crucial these days. An important issue to be addressed is data privacy. In this paper, we address a problem of data privacy based on a prominent privacy model, (k, e)-Anonymous, when a new dataset is to be released, meanwhile there might be existing datasets released elsewhere. Since some attackers might obtain multiple versions of the datasets and compare them with the newly released dataset. Though, the privacy of all the datasets have been well-preserved individually, such comparison can lead to an privacy breach. We study the characteristics of the effects of multiple dataset releasing theoretically. It has been found that the privacy breach subjected to the increment occurs when there exists overlapping between any partition of the new dataset with any partition of any existing dataset. Based on our proposed studies, a polynomial-time algorithm is proposed. Not only it needs only considering one previous version of the dataset, it also can skip computing the overlapping partitions. Thus, the computational complexity of the proposed algorithm is only O(pn3) where p is the number of partitions and n is the number of tuples, meanwhile the privacy of all released datasets as well as the optimal solution can be always guaranteed. In addition, the experiments results, which can illustrate the efficiency of our algorithm, on the real-world dataset is presented. © 2013 IEEE.en_US
dc.subjectComputer Scienceen_US
dc.titleAn efficient algorithm for incremental privacy breach on (k, e)-anonymous modelen_US
dc.typeConference Proceedingen_US
article.title.sourcetitleProceedings - 16th International Conference on Network-Based Information Systems, NBiS 2013en_US
article.stream.affiliationsChiang Mai Universityen_US
Appears in Collections:CMUL: Journal Articles

Files in This Item:
There are no files associated with this item.


Items in CMUIR are protected by copyright, with all rights reserved, unless otherwise indicated.