Affiliation:
1. TCS Research, Tata Consultancy Services Ltd.
Abstract
Each online interaction with an external service creates data about the user that is digitally recorded and stored. These external services may be credit card transactions, medical consultations, census data collection, voter registration, etc. Although the data is ostensibly collected to provide citizens with better services, the privacy of the individual is inevitably put at risk. With the growing reach of the Internet and the volume of data being generated, data protection and, specifically, preserving the privacy of individuals, have become particularly important. In this article we discuss the data privacy concepts using two fictitious characters, Swara and Betaal, and their interactions with a fictitious entity, namely Asha Hospital.
Publisher
Association for Computing Machinery (ACM)
Reference20 articles.
1. Approximation algorithms for k-anonymity;Aggarwal G.;Journal of Privacy Technology,2005
2. Fool's gold: an illustrated critique of differential privacy;Bambauer J.;Vanderbilt Journal of Entertainment and Technology Law,2014
3. Data Privacy through Optimal k-Anonymization
4. Britannica. People of India: Ethnic groups; https://www.britannica.com/place/India/People. Britannica. People of India: Ethnic groups; https://www.britannica.com/place/India/People.
5. Synthetic data in machine learning for medicine and healthcare
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. VoicePM: A Robust Privacy Measurement on Voice Anonymity;Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks;2023-05-29
2. Secure Genotype Imputation Using the Hidden Markov Model with Homomorphic Encryption;Lecture Notes in Networks and Systems;2023