Affiliation:
1. Software School of Xiamen University
Abstract
With the emergence and development of data applications such as database and data mining, how to protect data privacy and prevent disclosure of sensitive information has become one of the major challenges we are facing now. Privacy protection technologies need to protect data privacy without compromising data applications. The research results of privacy protection field are summarized, and the basic principles and features of various types of privacy protection technologies are described. After the in-depth analysis and comparison of existing technologies, this paper points out the future direction of the privacy protection technology.
Publisher
Trans Tech Publications, Ltd.
Reference5 articles.
1. Gao AQ, Diao LH. Privacy preservation for attribute order sensitive workload in medical data publishing. Journal of Software, 2009, 20(Suppl. ) p.314−320.
2. Chong Zhihong, Ni Weiwei, Liu TengTeng, and Zhang Yong. A privacy-preserving data publishing algorithm for clustering application. Journal of Computer Research and Development, 2010, 47(12) p.2083-(2089).
3. YANG Xiao-Chun, WANG Ya-Zhe, WANG Bin, YU Ge. Privacy preserving approaches for multiple sensitive attributes. Chinese Journal of Computers, 2008, 31(4) p.574−587.
4. ZHOU Shui-Geng, LI Feng, Tao Yu-Fei, XIAO Xiao-Kui. Privacy preservation in database applications: a survey. Chinese Journal of Computers, 2009, 32(4) p.847−861.
5. Guo YH, Tong YH, Tang SW, Yang DQ. Knowledge hiding in database. Journal of Software, 2007, 18(11) p.2782−2799.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献