Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/67152
Title: An introduction to various privacy models
Authors: Lu, X
Au, MH 
Keywords: Data anonymity
Data privacy
Data sharing
Differential privacy
K-anonymity
Privacy model
Issue Date: 2016
Publisher: Elsevier
Source: In MH Au & KKR Choo (Eds.), Mobile security and privacy : advances, challenges and future research directions. p. 235-245. Cambridge, MA: Elsevier, 2016 How to cite?
Abstract: While the growing popularity of mobile devices has brought great convenience to the general public, it also put the privacy of the individuals at risk. Mobile users' data are being collected by mobile devices every day for business and research purposes. The use of data mining tools has become increasingly popular. As such, great care must be taken, as the data collected may contain sensitive personal information. While the data may not contain explicit identifiers, they include information about location, physical attributes, or even payment history of an individual. When combined with some publicly available information, these data could be linked to the individual. This chapter introduces k-anonymity and differential privacy, two models that are commonly used to capture privacy requirements. We also discuss the various mechanisms with respect to these two models.
URI: http://hdl.handle.net/10397/67152
ISBN: 9780128047460
9780128046296
DOI: 10.1016/B978-0-12-804629-6.00011-0
Appears in Collections:Book Chapter

Access
View full-text via PolyU eLinks SFX Query
Show full item record

Page view(s)

11
Last Week
0
Last month
Checked on Aug 20, 2017

Google ScholarTM

Check

Altmetric



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.