Please use this identifier to cite or link to this item: http://cmuir.cmu.ac.th/jspui/handle/6653943832/68279
Full metadata record
DC FieldValueLanguage
dc.contributor.authorWaranya Mahananen_US
dc.contributor.authorW. Art Chaovalitwongseen_US
dc.contributor.authorJuggapong Natwichaien_US
dc.date.accessioned2020-04-02T15:24:14Z-
dc.date.available2020-04-02T15:24:14Z-
dc.date.issued2020-01-01en_US
dc.identifier.issn18632394en_US
dc.identifier.issn18632386en_US
dc.identifier.other2-s2.0-85080892996en_US
dc.identifier.other10.1007/s11761-020-00287-wen_US
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85080892996&origin=inwarden_US
dc.identifier.urihttp://cmuir.cmu.ac.th/jspui/handle/6653943832/68279-
dc.description.abstract© 2020, Springer-Verlag London Ltd., part of Springer Nature. Advancement in the Internet of Things (IoT) technologies makes life more convenient for people. Data sensed from the devices can be used for analyzing and responding to people’s needs seamlessly. An important consequence of such convenience is that privacy protection becomes a very important issue to be addressed effectively. Various data anonymization model has been proposed for such issue—one of the most widely applied models is the k-anonymity. The k-anonymity prevents the re-identification by replacing the input data with its more general form for transforming the data to have at least k identical tuples. In this paper, we focus on a special case of the input datasets which all the quasi-identifiers, the linkable attributes in the dataset, have identical data types, so-called identical generalization hierarchy (IGH). The solutions for such case will be applicable effectively to address the general IoT data privacy protection due to its data nature. We proposed a novel method to provide a globally optimized k-anonymity solution for the IGH datasets. The proposed algorithms determine an optimal solution based on the characteristics of the IGH data by visiting and evaluating only essential nodes of generalization lattice that satisfy the k-anonymity. Since the k-anonymization problem is an NP-hard, we show that our algorithm can efficiently find an optimal k-anonymity solutions with exploiting such special characteristics of the IGH data, i.e., the optimality between the nodes in different levels of generalization lattice. From the experimental results, it is obvious that our algorithm is much more efficient than the comparative algorithms by less searching on the given lattice.en_US
dc.subjectBusiness, Management and Accountingen_US
dc.subjectComputer Scienceen_US
dc.titleData anonymization: a novel optimal k-anonymity algorithm for identical generalization hierarchy data in IoTen_US
dc.typeJournalen_US
article.title.sourcetitleService Oriented Computing and Applicationsen_US
article.stream.affiliationsUniversity of Arkansas - Fayettevilleen_US
article.stream.affiliationsChiang Mai Universityen_US
Appears in Collections:CMUL: Journal Articles

Files in This Item:
There are no files associated with this item.


Items in CMUIR are protected by copyright, with all rights reserved, unless otherwise indicated.