Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2017, Article ID 2970673, 10 pages
https://doi.org/10.1155/2017/2970673
Research Article

The Anonymization Protection Algorithm Based on Fuzzy Clustering for the Ego of Data in the Internet of Things

1State Key Laboratory of Marine Resource Utilization in South China Sea, Haikou 570228, China
2College of Information Science & Technology, Hainan University, Haikou 570228, China
3College of Network, Haikou College of Economics, Haikou 571127, China

Correspondence should be addressed to Mengxing Huang; moc.361@90xmgnauh

Received 10 February 2017; Accepted 5 March 2017; Published 8 June 2017

Academic Editor: Jit S. Mandeep

Copyright © 2017 Mingshan Xie et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Sweeney, “K-anonymity: a model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557–570, 2002. View at Publisher · View at Google Scholar · View at MathSciNet
  2. A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, “L-diversity: privacy beyond k-anonymity,” in Proceedings of the 22nd International Conference on Data Engineering (ICDE '06), pp. 24–36, Atlanta, Ga, USA, April 2006. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Machanavajjhala, D. Kifer, J. Gehrke et al., “L-diversity: privacy beyond k-anonymity,” ACM Transactions on Knowledge Discovery from Data, vol. 1, no. 1, article 3, 52 pages, 2007. View at Publisher · View at Google Scholar
  4. R. Wong, J. Li, A. Fu, and K. Wang, “(α, k)-anonymous data publishing,” Journal of Intelligent Information Systems, vol. 33, no. 2, pp. 209–234, 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. G. Aggarwal, T. Feder, K. Kenthapadi et al., “Achieving anonymity via clustering,” in Proceeding of the 25th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS '06), pp. 153–162, New York-NY-USA, June 2006. View at Publisher · View at Google Scholar · View at Scopus
  6. Ning Z. H., W. Jiang, J. Zhan et al., “Property-based anonymous attestation in trusted cloud computing,” Journal of Electrical and Computer Engineering, vol. 2014, no. 17, pp. 1–7, 2014. View at Google Scholar
  7. S. Muftic, N. B. Abdullah, and I. Kounelis, “Business information exchange system with security, privacy, and anonymity,” Journal of Electrical and Computer Engineering, vol. 2016, no. 1, pp. 1–10, 2016. View at Publisher · View at Google Scholar · View at Scopus
  8. S. Landau, “Control use of data to protect privacy,” Science, vol. 347, no. 6221, pp. 504–506, 2015. View at Publisher · View at Google Scholar · View at Scopus
  9. J. C. Doshi and B. Trivedi, “Hybrid intelligent access control framework to protect data privacy and theft,” in Proceeding of the International Conference on Advances in Computing, Communications and Informatics (ICACCI '15), pp. 1766–1770, 2015. View at Publisher · View at Google Scholar · View at Scopus
  10. Y.-S. Jeong and S.-S. Shin, “An efficient authentication scheme to protect user privacy in seamless big data services,” Wireless Personal Communications, vol. 86, no. 1, pp. 7–19, 2016. View at Publisher · View at Google Scholar · View at Scopus
  11. Y. Ge and F. Li, “Data management in the internet of things,” Chinese society of computer communication, vol. 6, no. 4, pp. 30–34, 2010. View at Google Scholar
  12. H. Wei and C. Zhong, “Information technology of Internet of things k-anonymous algorithm based on parallel clustering,” Information Technology, vol. 12, pp. 6–10, 2013. View at Google Scholar
  13. H. Bah and A. Lev, “k-anonymity based framework for privacy preserving data collection in wireless sensor networks,” Turkish Journal of Electrical Engineering & Computer Sciences, vol. 18, no. 2, pp. 241–271, 2010. View at Google Scholar
  14. A. Samani, H. H. Ghenniwa, and A. Wahaishi, “Privacy in internet of things: a model and protection framework,” Procedia Computer Science, vol. 52, no. 538, pp. 606–613, 2015. View at Google Scholar