ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Privacy Preserving Utility Verification of Data Published

Journal: International Journal of Science and Research (IJSR) (Vol.10, No. 8)

Publication Date:

Authors : ;

Page : 1126-1129

Keywords : Data Privacy; Encryption; Frequency; Security; Utility Verification;

Source : Downloadexternal Find it from : Google Scholarexternal


With modern collaborative data publishing techniques, the problem is that a central data publisher is liable for aggregating sensitive data from multiple parties then anonymizing it before publishing for data processing. In such scenarios, the user demands to know the utility of their published data since most anonymization techniques have side effects on data utility. Moreover, a corrupt data publisher is capable of misusing the collected data for their gains. We could call this an "insider attack". In this paper, we address this problem and briefly discuss a few proposed solutions.

Last modified: 2022-02-15 18:36:48