Research on anonymous protection technology for big data publishing
Big data publishing anonymity technology is the main way to achieve privacy protection, it is a research hotspot of data publishing privacy protection. Applying anonymity protection to data is an effective way to protect the privacy of data subject in the process of micro data publishing. This paper...
Saved in:
Published in | Proceedings (IEEE International Conference on Software Engineering and Service Sciences. Print) pp. 438 - 441 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.08.2016
|
Subjects | |
Online Access | Get full text |
ISSN | 2327-0594 |
DOI | 10.1109/ICSESS.2016.7883103 |
Cover
Abstract | Big data publishing anonymity technology is the main way to achieve privacy protection, it is a research hotspot of data publishing privacy protection. Applying anonymity protection to data is an effective way to protect the privacy of data subject in the process of micro data publishing. This paper analyzes the data publishing privacy protection technology in the anonymous models and main technologies, induces and summarizes the advantages and disadvantages of the anonymization algorithms and the existing problems. Finally, the development direction of privacy protection anonymity technology is prospected. |
---|---|
AbstractList | Big data publishing anonymity technology is the main way to achieve privacy protection, it is a research hotspot of data publishing privacy protection. Applying anonymity protection to data is an effective way to protect the privacy of data subject in the process of micro data publishing. This paper analyzes the data publishing privacy protection technology in the anonymous models and main technologies, induces and summarizes the advantages and disadvantages of the anonymization algorithms and the existing problems. Finally, the development direction of privacy protection anonymity technology is prospected. |
Author | Cheng Yang Yaping Zhu Jiayin Tian Yuli Wang |
Author_xml | – sequence: 1 surname: Yuli Wang fullname: Yuli Wang organization: Commun. Univ. of China, Beijing, China – sequence: 2 surname: Jiayin Tian fullname: Jiayin Tian email: tjy@cuc.edu.cn organization: Commun. Univ. of China, Beijing, China – sequence: 3 surname: Cheng Yang fullname: Cheng Yang email: cafeeyang@163.com organization: Commun. Univ. of China, Beijing, China – sequence: 4 surname: Yaping Zhu fullname: Yaping Zhu email: zhuyaping@cuc.edu.cn organization: Commun. Univ. of China, Beijing, China |
BookMark | eNotj9FKwzAYhaMouM09wW7yAp3_36RNeill6mAgWL0eSZq0ka4pTXfRt7fgLg4fnIuPc9bkoQ-9JWSHsEeE4uVYVoeq2qeA-V5IyRDYHVkjzwUrCuDsnqxSlooEsoI_kW2MvwDAUBaAbEXKLxutGk1LQ0_Vop4v4RrpMIbJmskv5cK2D11oZurCSLVvaK0mRYer7nxsfd88k0enumi3N27Iz9vhu_xITp_vx_L1lHgU2ZQU0tSaq1rlUkknhBWcmYwv4zSkTtoMwSHPam6kU9o4kXKNXHMDS7gTbEN2_15vrT0Po7-ocT7fPrM_8_pOEQ |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICSESS.2016.7883103 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISBN | 1467399043 9781467399043 |
EISSN | 2327-0594 |
EndPage | 441 |
ExternalDocumentID | 7883103 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI OCL RIE RIL |
ID | FETCH-LOGICAL-i175t-98cdb4ada68a8f77e743c54232b02f8e510f145d4c8fabcf724b14b4c0b4c4f73 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 02:11:37 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-98cdb4ada68a8f77e743c54232b02f8e510f145d4c8fabcf724b14b4c0b4c4f73 |
PageCount | 4 |
ParticipantIDs | ieee_primary_7883103 |
PublicationCentury | 2000 |
PublicationDate | 2016-Aug. |
PublicationDateYYYYMMDD | 2016-08-01 |
PublicationDate_xml | – month: 08 year: 2016 text: 2016-Aug. |
PublicationDecade | 2010 |
PublicationTitle | Proceedings (IEEE International Conference on Software Engineering and Service Sciences. Print) |
PublicationTitleAbbrev | ICSESS |
PublicationYear | 2016 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0003189013 |
Score | 1.6118762 |
Snippet | Big data publishing anonymity technology is the main way to achieve privacy protection, it is a research hotspot of data publishing privacy protection.... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 438 |
SubjectTerms | dynamic data Joining processes K-anonymous Knowledge based systems L-diversity Medical services Micro data Privacy Publishing static data |
Title | Research on anonymous protection technology for big data publishing |
URI | https://ieeexplore.ieee.org/document/7883103 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1La8MwDBZdT9tlj3bsjQ87zmnSyol7LivdoGOHFXortmONMmjLSC_79ZOTNHuwww6BEDAxlmzJ0qdPALeUGExym0hSpCUqUjKwqEkKZx9m6HyZMZ0-pZMZPs7VvAV3TS2M974En_kovJa5_HzttiFU1uPrWmiLtQd7rGZVrVYTT2HdZNM2qImFknjYexiFEymgt9KoHvmjhUppQcaHMN39uwKOvEXbwkbu4xct438ndwTdr1o98dxYoWNo-dUJHHyjGezAaAevE-uVMLv7vqgpGlgwomgC7IKdWGGXryJAR8WmCVJ1YTa-fxlNZN08QS7ZIyjkULvcoslNqo2mLPPsKjgV0rI27pP2vBcpQZWj02Sso6yPNkGLLuYHKRucQpsn5M9AWOcNDbM8UGNhTEajIXYzUoeDNEXlz6ETlmOxqfgxFvVKXPz9-RL2g0gqEN0VtIv3rb9mw17Ym1KinzOgpB4 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED6VMgALjxbxxgMjTpP2nLhzRdVCWzG0UrfKdnwIIbUVShd-PXaShocYGCJFkaJYPsff-e677wDuKFIYpTriJEhyFCS4V1Hj5Pc-TNDYPGM6nsSDGT7OxbwG91UtjLU2J5_ZwN_mufx0ZTY-VNZyxzXfFmsHdh3uoyiqtaqIiludDtw6pbRQFHZbw57fkzx_Kw7Kd380UckxpH8I4-3XC-rIW7DJdGA-fgkz_nd4R9D8qtZjzxUOHUPNLk_g4JvQYAN6W4IdWy2Z2p74WSnS4EzDsirEzpwby_TrC_PkUbauwlRNmPUfpr0BL9sn8FfnE2S8K02qUaUqlkpSkljnLBjhE7M6bJO07m-kCEWKRpLShpI26gg1mtBdSEnnFOpuQPYMmDZWUTdJvTgWhqQkKnKORmywE8co7Dk0_HQs1oVCxqKciYu_H9_C3mA6Hi1Gw8nTJex78xSUuiuoZ-8be-1gPtM3uXU_Afqbp2s |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=Proceedings+%28IEEE+International+Conference+on+Software+Engineering+and+Service+Sciences.+Print%29&rft.atitle=Research+on+anonymous+protection+technology+for+big+data+publishing&rft.au=Yuli+Wang&rft.au=Jiayin+Tian&rft.au=Cheng+Yang&rft.au=Yaping+Zhu&rft.date=2016-08-01&rft.pub=IEEE&rft.eissn=2327-0594&rft.spage=438&rft.epage=441&rft_id=info:doi/10.1109%2FICSESS.2016.7883103&rft.externalDocID=7883103 |