Loading [MathJax]/extensions/MathMenu.js
TMk-Anonymity: Perturbation-Based Data Anonymization Method for Improving Effectiveness of Secondary Use | IEEE Conference Publication | IEEE Xplore

TMk-Anonymity: Perturbation-Based Data Anonymization Method for Improving Effectiveness of Secondary Use


Abstract:

The recent emergence of smartphones, cloud computing, and the Internet of Things has brought about the explosion of data creation. By collating and merging these enormous...Show More

Abstract:

The recent emergence of smartphones, cloud computing, and the Internet of Things has brought about the explosion of data creation. By collating and merging these enormous data with other information, services that use information become more sophisticated and advanced. However, at the same time, the consideration of privacy violations caused by such merging is indispensable. Various anonymization methods have been proposed to preserve privacy. The conventional perturbation-based anonymization method of location data adds comparatively larger noise, and the larger noise makes it difficult to utilize the data effectively for secondary use. In this research, to solve these problems, we first clarified the definition of privacy preservation and then propose TMk-anonymity according to the definition.
Date of Conference: 21-23 October 2018
Date Added to IEEE Xplore: 30 December 2018
ISBN Information:

ISSN Information:

Conference Location: Washington, DC, USA

Contact IEEE to Subscribe

References

References is not available for this document.