k-Anonymous Data Mining: A Survey

  • Ciriani V
  • di Vimercati S
  • Foresti S
  • et al.
N/ACitations
Citations of this article
63Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Data mining technology has attracted significant interest as a means of identifying patterns and trends from large collections of data. It is however evident that the collection and analysis of data that include personal information may violate the privacy of the individuals to whom information refers. Privacy protection in data mining is then becoming a crucial issue that has captured the attention of many researchers. In this chapter, we first describe the concept of k -anonymity and illustrate different approaches for its enforcement. We then discuss how the privacy requirements characterized by k -anonymity can be violated in data mining and introduce possible approaches to ensure the satisfaction of k -anonymity in data mining.

Cite

CITATION STYLE

APA

Ciriani, V., di Vimercati, S. D. C., Foresti, S., & Samarati, P. (2008). k-Anonymous Data Mining: A Survey (pp. 105–136). https://doi.org/10.1007/978-0-387-70992-5_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free