File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Book Chapter: An Introduction to Various Privacy Models

TitleAn Introduction to Various Privacy Models
Authors
KeywordsData privacy
Data sharing
Differential privacy
K-anonymity
Privacy model
Data anonymity
Issue Date2017
PublisherSyngress.
Citation
An Introduction to Various Privacy Models. In Au, MH, Choo, KR (Eds.), Mobile Security and Privacy: Advances, Challenges and Future Research Directions, p. 235-245. Cambridge, MA: Syngress, 2017 How to Cite?
Abstract© 2017 Elsevier Inc. All rights reserved. While the growing popularity of mobile devices has brought great convenience to the general public, it also put the privacy of the individuals at risk. Mobile users' data are being collected by mobile devices every day for business and research purposes. The use of data mining tools has become increasingly popular. As such, great care must be taken, as the data collected may contain sensitive personal information. While the data may not contain explicit identifiers, they include information about location, physical attributes, or even payment history of an individual. When combined with some publicly available information, these data could be linked to the individual. This chapter introduces k-anonymity and differential privacy, two models that are commonly used to capture privacy requirements. We also discuss the various mechanisms with respect to these two models.
Persistent Identifierhttp://hdl.handle.net/10722/280613
ISBN

 

DC FieldValueLanguage
dc.contributor.authorLu, X-
dc.contributor.authorAu, MH-
dc.date.accessioned2020-02-17T14:34:29Z-
dc.date.available2020-02-17T14:34:29Z-
dc.date.issued2017-
dc.identifier.citationAn Introduction to Various Privacy Models. In Au, MH, Choo, KR (Eds.), Mobile Security and Privacy: Advances, Challenges and Future Research Directions, p. 235-245. Cambridge, MA: Syngress, 2017-
dc.identifier.isbn9780128046296-
dc.identifier.urihttp://hdl.handle.net/10722/280613-
dc.description.abstract© 2017 Elsevier Inc. All rights reserved. While the growing popularity of mobile devices has brought great convenience to the general public, it also put the privacy of the individuals at risk. Mobile users' data are being collected by mobile devices every day for business and research purposes. The use of data mining tools has become increasingly popular. As such, great care must be taken, as the data collected may contain sensitive personal information. While the data may not contain explicit identifiers, they include information about location, physical attributes, or even payment history of an individual. When combined with some publicly available information, these data could be linked to the individual. This chapter introduces k-anonymity and differential privacy, two models that are commonly used to capture privacy requirements. We also discuss the various mechanisms with respect to these two models.-
dc.languageeng-
dc.publisherSyngress.-
dc.relation.ispartofMobile Security and Privacy: Advances, Challenges and Future Research Directions-
dc.subjectData privacy-
dc.subjectData sharing-
dc.subjectDifferential privacy-
dc.subjectK-anonymity-
dc.subjectPrivacy model-
dc.subjectData anonymity-
dc.titleAn Introduction to Various Privacy Models-
dc.typeBook_Chapter-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1016/B978-0-12-804629-6.00011-0-
dc.identifier.scopuseid_2-s2.0-85009958103-
dc.identifier.spage235-
dc.identifier.epage245-
dc.publisher.placeCambridge, MA-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats