International Journal of
Physical Sciences

  • Abbreviation: Int. J. Phys. Sci.
  • Language: English
  • ISSN: 1992-1950
  • DOI: 10.5897/IJPS
  • Start Year: 2006
  • Published Articles: 2572

Review

Privacy preserving data publishing: Review

Asmaa Hatem Rashid
  • Asmaa Hatem Rashid
  • Department of Information Science, Faculty of Computer Science and IT, University of Malaya, Kuala Lumpur, 50603 KL, Malaysia.
  • Google Scholar
Norizan Binti Mohd Yasin
  • Norizan Binti Mohd Yasin
  • Department of Information Science, Faculty of Computer Science and IT, University of Malaya, Kuala Lumpur, 50603 KL, Malaysia.
  • Google Scholar


  •  Received: 30 December 2011
  •  Accepted: 24 November 2014
  •  Published: 16 April 2015

References

Adam NR, Worthmann JC (1989). Security-control methods for statistical databases: A comparative study. ACM Computing Surveys (CSUR). 21(4):515-556.
Crossref
 
Ahmed NS, Yasin NM (2012). Improvement the cooperation feature in distributed healthcare information systems based on the fractal approach: An empirical study. Adv. Mater. Res. 463:861-867.
Crossref
 
Appari A, Johnson ME (2010). Information security and privacy in healthcare: current state of research. Int. J. Internet enterprise manage. 6(4):279-314.
Crossref
 
Bertino E, Fovino IN, Provenza LP (2005a). A framework for evaluating privacy preserving data mining algorithms. Data Mining Knowledge Discovery. 11(2):121-154. doi: 10.1007/s10618-005-0006-6.
Crossref
 
Bertino E, Fovino IN, Provenza LP (2005b). A framework for evaluating privacy preserving data mining algorithms*. Data Mining Knowledge Discovery. 11(2):121-154.
Crossref
 
Bertino E, Sandhu R (2005). Database security - Concepts, approaches, and challenges. IEEE Trans. Dependable Secure Computing. 2(1):2-19.
Crossref
 
Blum A, Dwork C, McSherry F, Nissim K (2005). Practical privacy: the SuLQ framework. In: Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. pp. 128-138.
Crossref
 
Blum A, Ligett K, Roth A (2008). A learning theory approach to non-interactive database privacy. In: Proceedings of the 40th ACM SIGACT Symposium on Thoery of Computing. pp. 609-618.
Crossref
 
Bowman S (2012). Impact of Electronic Health Record Systems on Information Integrity: quality and safety implications. Perspectives in Health Information Management. P. 10.
 
Brand R (2002). Microdata protection through noise addition. Infer. Contr. Statistical Databases pp. 61-74.
Crossref
 
Chaum DL (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM. 24(2):84-90.
Crossref
 
Chen L, Yang JJ, Wang Q, Niu Y (2012). A framework for privacy-preserving healthcare data sharing. Paper presented at the e-Health Networking, Applications and Services (Healthcom), 2012 IEEE 14th International Conference on; 01/2012.
Crossref
 
Clifton C, Kantarcioglu M, Vaidya J, Lin X, Zhu MY (2002). Tools for privacy preserving distributed data mining. ACM Sigkdd Explorations Newsletter 4(2):28-34.
Crossref
 
Committee PITAC (2004). Revolutionizing health care through information technology. Report to the President of the United States.
 
Dalenius T (1977). Towards a methodology for statistical disclosure control. Statistik Tidskrift, 15(429-444):2-1.
 
Dinur I, Nissim K (2003). Revealing information while preserving privacy. In: Proceedings of ACM PODS, pp.202–210.
Crossref
 
Dwork C (2008). Differential privacy: A survey of results. Theory Appli. Models Comput. pp.1-19.
Crossref
 
Fung BCM, Wang K, Chen R, Yu PS (2010). Privacy-preserving data publishing: A survey on recent developments. Computing. 5(4):1-53.
Crossref
 
Fung BCM, Wang K, Yu PS (2007). Anonymizing classification data for privacy preservation. IEEE Trans. Knowledge Data Eng. 19(5):711-725. doi: 10.1109/tkde.2007.1015.
Crossref
 
Gehrke J (2006). Models and methods for privacy-preserving data analysis and publishing. In ICDE 2006: Proceedings Of The Twenty second International Conference on Data Engineering, P. 105. IEEE Computer Society, Washington, Dc, USA.
 
Gkoulalas-Divanis A, Loukides G (2011). Medical Data Sharing: Privacy Challenges and Solutions. Dublin, Ireland. https://books.google.com.ng/books?id=HFLXlOdkpD8C&pg=PR6&dq=2011.+Medical+Data+Sharing:+Privacy+Challenges+and+Solutions.&hl=en&sa=X&ei=QqMKVYfHEIfcatSdgcgF&ved=0CCQQ6AEwAA#v=onepage&q=2011.%20Medical%20Data%20Sharing%3A%20Privacy%20Challenges%20and%20Solutions.&f=false
 
Gkoulalas-Divanis A, Verykiosc VS (2009). An overview of privacy preserving data mining. Crossroads 15(4):6.
Crossref
 
Jakobsson M, Juels A, Rivest RL (2002). Making mix nets robust for electronic voting by randomized partial checking. http://people.csail.mit.edu/rivest/JakobssonJuelsRivest-MakingMixNetsRobustForElectronicVotingByRandomizedPartialChecking.pdf
 
LeFevre K, DeWitt DJ, Ramakrishnan R (2006). Mondrian multidimensional k-anonymity. In: Proc. of the 22nd International conference on Data Engineering (ICDE, 2006). IEEE. pp. 25-35.
 
Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007). l-diversity: Privacy beyond k-anonymity. ACM Trans. Knowledge Discovery Data (TKDD). 1(1):3.
Crossref
 
Ohno-Machado L (2013). Sharing data for the public good and protecting individual privacy: informatics solutions to combine different goals. J. Am. Medical Info. Association. 20(1):1-1.
Crossref
 
Parmar AA, Rao UP, Patel DR (2011). Blocking based approach for classification Rule hiding to preserve the Privacy in Database. Paper presented at the Computer Science and Society (ISCCS), 2011 International Symposium on; 08/2011
Crossref
 
Qi X, Zong M (2012). An Overview of Privacy Preserving Data Mining. Procedia. Environ. Sci. 12:1341-1347.
Crossref
 
Sweeney L (2002). k-anonymity: A model for protecting privacy. Int. J. Uncertainty Fuzziness Knowledge Based Syst. 10(5):557-570.
Crossref
 
Warner SL (1965). Randomized response: A survey technique for eliminating evasive answer bias. J. Am. Statistical Association. 63-69.
Crossref
 
Wu S, Chaudhry B, Wang J, Maglione M, Mojica W, Roth E, Shekelle PG (2006). Systematic review: Impact of health information technology on quality, efficiency, and costs of medical care. Annals internal medicine. 144(10):742-752.
Crossref
 
Yang Z, Zhong S, Wright RN (2005). Anonymity-preserving data collection. In Proc. eleventh ACM SIGKDD int. Confer. Knowledge discovery data mining ACM. pp. 334-343.
Crossref