skip to main content
Skip header Section
Introduction to Privacy-Preserving Data Publishing: Concepts and TechniquesAugust 2010
Publisher:
  • Chapman & Hall/CRC
ISBN:978-1-4200-9148-9
Published:02 August 2010
Pages:
376
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

Gaining access to high-quality data is a vital necessity in knowledge-based decision making. But data in its raw form often contains sensitive information about individuals. Providing solutions to this problem, the methods and tools of privacy-preserving data publishing enable the publication of useful information while protecting data privacy. Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques presents state-of-the-art information sharing and data integration methods that take into account privacy and data mining requirements. The first part of the book discusses the fundamentals of the field. In the second part, the authors present anonymization methods for preserving information utility for specific data mining tasks. The third part examines the privacy issues, privacy models, and anonymization methods for realistic and challenging data publishing scenarios. While the first three parts focus on anonymizing relational data, the last part studies the privacy threats, privacy models, and anonymization methods for complex data, including transaction, trajectory, social network, and textual data. This book not only explores privacy and information utility issues but also efficiency and scalability challenges. In many chapters, the authors highlight efficient and scalable methods and provide an analytical discussion to compare the strengths and weaknesses of different solutions.

Cited By

  1. Mohapatra D and Patra M (2019). Anonymization of attributed social graph using anatomy based clustering, Multimedia Tools and Applications, 78:18, (25455-25486), Online publication date: 1-Sep-2019.
  2. ACM
    Patra M and Mohapatra D Privacy Preservation of e-Governance Data Using Local Beam Search Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance, (318-327)
  3. Benslimane S, Kabou S and Mosteghanemi M (2018). A Survey on Privacy Preserving Dynamic Data Publishing, International Journal of Organizational and Collective Intelligence, 8:4, (1-20), Online publication date: 1-Oct-2018.
  4. Ayala-Rivera V, McDonagh P, Cerqueus T, Murphy L and Thorpe C (2017). Enhancing the Utility of Anonymized Data by Improving the Quality of Generalization Hierarchies, Transactions on Data Privacy, 10:1, (27-59), Online publication date: 1-Apr-2017.
  5. Biskup J Selected Results and Related Issues of Confidentiality-Preserving Controlled Interaction Execution Proceedings of the 9th International Symposium on Foundations of Information and Knowledge Systems - Volume 9616, (211-234)
  6. Ciglic M, Eder J and Koncilia C Anonymization of Data Sets with NULL Values Special Issue on Database- and Expert-Systems Applications on Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIV - Volume 9510, (193-220)
  7. Queiroz M, Lino N and Motta G A Domain Ontology for Privacy Preservation in Data Published by the Brazilian Government Proceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era - Volume 1, (9-16)
  8. ACM
    Brito F, Neto A, Costa C, Mendonça A and Machado J A Distributed Approach for Privacy Preservation in the Publication of Trajectory Data Proceedings of the 2nd Workshop on Privacy in Geographic Information Collection and Analysis, (1-8)
  9. ACM
    Abdel Wahab O, Hachami M, Zaffari A, Vivas M and Dagher G DARM Proceedings of the 18th International Database Engineering & Applications Symposium, (1-8)
  10. Babu K, Reddy N, Kumar N, Elliot M and Jena S (2013). Achieving k-anonymity Using Improved Greedy Heuristics for Very Large Relational Databases, Transactions on Data Privacy, 6:1, (1-17), Online publication date: 1-Apr-2013.
  11. ACM
    Fard A, Wang K and Yu P Limiting link disclosure in social network analysis through subgraph-wise perturbation Proceedings of the 15th International Conference on Extending Database Technology, (109-119)
  12. Takenouchi T, Kawamura T and Ohsuga A Distributed data federation without disclosure of user existence Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy, (282-297)
  13. ACM
    Taneja K, Grechanik M, Ghani R and Xie T Testing software in age of data privacy Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering, (201-211)
  14. Cheng M, Choi B and Cheung W Hiding emerging patterns with local recoding generalization Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I, (158-170)
Contributors
  • McGill University
  • Simon Fraser University
  • Chinese University of Hong Kong
  • University of Illinois at Chicago

Recommendations