Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017 (2017), Article ID 9532163, 10 pages
https://doi.org/10.1155/2017/9532163
Research Article

Practical --Anonymization for Collaborative Data Publishing without Trusted Third Party

1State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093, China
2Department of Computer Science and Technology, Nanjing University, Nanjing 210023, China
3Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX 78249-0631, USA
4School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, China
5Key Laboratory of Complex Systems Modeling and Simulation, Ministry of Education, China, Hangzhou Dianzi University, Hangzhou 310018, China

Correspondence should be addressed to Hong Ding and Yizhi Ren

Received 6 October 2016; Revised 9 February 2017; Accepted 27 February 2017; Published 16 March 2017

Academic Editor: Willy Susilo

Copyright © 2017 Jingyu Hua et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. K. LeFevre, D. J. DeWitt, and R. Ramakrishnan, “Mondrian multidimensional K-anonymity,” in Proceedings of the 22nd International Conference on Data Engineering (ICDE '06), pp. 25–34, IEEE, Atlanta, Ga, USA, April 2006. View at Publisher · View at Google Scholar · View at Scopus
  2. K. LeFevre, D. J. DeWitt, and R. Ramakrishnan, “Incognito: efficient full-domain K-anonymity,” in Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data (SIGMOD '05), pp. 49–60, Baltimore, Md, USA, 2005.
  3. L. Sweeney, “k -anonymity: a model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557–570, 2002. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  4. Y. Lindell and B. Pinkas, “Pinkas secure multiparty computation for privacy-preserving data mining,” Journal of Privacy and Confidentiality, vol. 1, no. 1, pp. 59–98, 2009. View at Google Scholar
  5. M. E. Nergiz, E. Çiçek, T. Pedersen, and Y. Saygin, “A look-ahead approach to secure multiparty protocols,” IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 7, pp. 1170–1185, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. W. Jiang and C. Clifton, “Privacy-preserving distributed k-anonymity,” in Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pp. 166–177, Storrs, Conn, USA, August 2005.
  7. S. Zhong, Z. Yang, and R. N. Wright, “Privacy-enhancing k-anonymization of customer data,” in Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS '05), pp. 139–147, June 2005. View at Scopus
  8. W. Jiang and C. Clifton, “A secure distributed framework for achieving k-anonymity,” The VLDB Journal, vol. 15, no. 4, pp. 316–333, 2006. View at Publisher · View at Google Scholar · View at Scopus
  9. P. Jurczyk and L. Xiong, “Distributed anonymization: achieving privacy for both data subjects and data providers,” in Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII, vol. 5645 of Lecture Notes in Computer Science, pp. 191–207, Springer, 2009. View at Google Scholar
  10. N. Mohammed, B. C. M. Fung, K. Wang, and P. C. K. Hung, “Privacy-preserving data mashup,” in Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology (EDBT '09), pp. 228–239, ACM, Saint Petersburg, Russia, March 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. N. Mohammed, B. C. M. Fung, P. C. K. Hung, and C.-K. Lee, “Centralized and distributed anonymization for high-dimensional healthcare data,” ACM Transactions on Knowledge Discovery from Data, vol. 4, no. 4, article no. 18, 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. A. C. Yao, “Protocols for secure computations,” in Proceedings of the 23rd IEEE Symposium on the Foundation of Computer Science (FOCS '82), pp. 160–164, Chicago, Ill, USA, November 1982.
  13. S. Goryczka, L. Xiong, and B. Fung, “m-privacy for collaborative data publishing,” in Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 1–10, Orlando, Fla, USA, October 2011. View at Publisher · View at Google Scholar
  14. S. I. Ahamed, M. M. Haque, and C. S. Hasan, “A novel location privacy framework without trusted third party based on location anonymity prediction,” ACM SIGAPP Applied Computing Review, vol. 12, no. 1, pp. 24–34, 2012. View at Publisher · View at Google Scholar
  15. L. L. Win, T. Thomas, and S. Emmanuel, “Privacy enabled digital rights management without trusted third party assumption,” IEEE Transactions on Multimedia, vol. 14, no. 3, pp. 546–554, 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. Z. Fu, X. Wu, C. Guan, X. Sun, and K. Ren, “Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 12, pp. 2706–2716, 2016. View at Publisher · View at Google Scholar
  17. Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 9, pp. 2546–2559, 2016. View at Publisher · View at Google Scholar · View at Scopus
  18. Z. Fu, X. Sun, S. Ji, and G. Xie, “Towards efficient content-aware search over encrypted outsourced data in cloud,” in Proceedings of the 35th Annual IEEE International Conference on Computer Communications (INFOCOM '16), pp. 1–9, IEEE, San Francisco, Calif, USA, April 2016. View at Publisher · View at Google Scholar · View at Scopus
  19. Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 340–352, 2016. View at Publisher · View at Google Scholar · View at Scopus
  20. A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, “L-diversity: privacy beyond k-anonymity,” ACM Transactions on Knowledge Discovery from Data, vol. 1, no. 1, article 3, 2007. View at Publisher · View at Google Scholar · View at Scopus
  21. N. Li, T. Li, and S. Venkatasubramanian, “t-closeness: privacy beyond k-anonymity and -diversity,” in Proceedings of the 23rd International Conference on Data Engineering (ICDE '07), pp. 106–115, April 2007. View at Publisher · View at Google Scholar · View at Scopus
  22. K.-K. R. Choo, “Cloud computing: challenges and future directions,” Trends & Issues in Crime and Criminal, vol. 400, pp. 1–6, 2010. View at Google Scholar
  23. K.-K. R. Choo, “Legal issues in the cloud,” IEEE Cloud Computing, vol. 1, no. 1, pp. 94–96, 2014. View at Publisher · View at Google Scholar · View at Scopus
  24. Y. Yang, J. Liu, A. Liang, K.-K. R. Choo, and J. Zhou, “Extended proxy-assisted approach: achieving revocable fine-grained cloud data encryption,” in Proceedings of the 20th European Symposium on Research in Computer Security, pp. 146–166, Vienna, Austria, September 2015.
  25. G. S. Babu and S. Suresh, “Sequential projection-based metacognitive learning in a radial basis function network for classification problems,” IEEE Transactions on Neural Networks and Learning Systems, vol. 24, no. 2, pp. 194–206, 2013. View at Publisher · View at Google Scholar · View at Scopus
  26. P. G. Ipeirotis, F. Provost, V. S. Sheng, and J. Wang, “Repeated labeling using multiple noisy labelers,” Data Mining and Knowledge Discovery, vol. 28, no. 2, pp. 402–441, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  27. K. Subramanian, R. Savitha, and S. Suresh, “A complex-valued neuro-fuzzy inference system and its learning mechanism,” Neurocomputing, vol. 123, pp. 110–120, 2014. View at Publisher · View at Google Scholar · View at Scopus