Please use this identifier to cite or link to this item:
https://doi.org/10.1109/TDSC.2009.47
DC Field | Value | |
---|---|---|
dc.title | CASTLE: Continuously anonymizing data streams | |
dc.contributor.author | Cao, J. | |
dc.contributor.author | Carminati, B. | |
dc.contributor.author | Ferrari, E. | |
dc.contributor.author | Tan, K.-L. | |
dc.date.accessioned | 2013-07-04T07:46:10Z | |
dc.date.available | 2013-07-04T07:46:10Z | |
dc.date.issued | 2011 | |
dc.identifier.citation | Cao, J., Carminati, B., Ferrari, E., Tan, K.-L. (2011). CASTLE: Continuously anonymizing data streams. IEEE Transactions on Dependable and Secure Computing 8 (3) : 337-352. ScholarBank@NUS Repository. https://doi.org/10.1109/TDSC.2009.47 | |
dc.identifier.issn | 15455971 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/39639 | |
dc.description.abstract | Most of the existing privacy-preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are continuous, transient, and usually unbounded. Moreover, in streaming applications, there is a need to offer strong guarantees on the maximum allowed delay between incoming data and the corresponding anonymized output. To cope with these requirements, in this paper, we present Continuously Anonymizing STreaming data via adaptive cLustEring (CASTLE), a cluster-based scheme that anonymizes data streams on-the-fly and, at the same time, ensures the freshness of the anonymized data by satisfying specified delay constraints. We further show how CASTLE can be easily extended to handle ℓ-diversity. Our extensive performance study shows that CASTLE is efficient and effective w.r.t. the quality of the output data. © 2011 IEEE. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/TDSC.2009.47 | |
dc.source | Scopus | |
dc.subject | anonymity | |
dc.subject | Data stream | |
dc.subject | privacy-preserving data mining | |
dc.type | Article | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.doi | 10.1109/TDSC.2009.47 | |
dc.description.sourcetitle | IEEE Transactions on Dependable and Secure Computing | |
dc.description.volume | 8 | |
dc.description.issue | 3 | |
dc.description.page | 337-352 | |
dc.identifier.isiut | 000288453700002 | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.