Privacy-preserving data mashup model for trading person-specific information

Electronic Commerce Research and Applications - Tập 17 - Trang 19-37 - 2016
Rashid Hussain Khokhar1, Benjamin C.M. Fung2, Farkhund Iqbal3, Dima Alhadidi3, Jamal Bentahar1
1CIISE, Concordia University, Montreal, QC, Canada
2School of Information Studies, McGill University, Montreal, QC, Canada
3College of Technological Innovation, Zayed University, Abu Dhabi, United Arab Emirates

Tài liệu tham khảo

2014 Acquisti, A., Friedman, A., Telang, R., 2006. Is there a cost to privacy breaches? An event study. In: Proceedings of the 27th International Conference on Information. Aljafer, 2014, A brief overview and an experimental evaluation of data confidentiality measures on the cloud, Journal of Innovation in Digital Ecosystems, 1, 1, 10.1016/j.jides.2015.02.001 Arafati, 2014, D-mash: a framework for privacy-preserving data-as-a-service mashups, 498 Backman, 2011 Bevitt, 2012 Boardman, 2006 Currie, W.L., Seddon, J.J.M., 2014. A cross-country study of cloud computing policy and regulation in healthcare. In: Proceedings of the 22nd European Conference on Information Systems. Dalenius, 1982, Data-swapping: a technique for disclosure control, Journal of Statistical Planning and Inference, 6, 73, 10.1016/0378-3758(82)90058-1 Data Management Platforms Buyer’s Guide, 2013. Econsultancy Digital Marketing Excellence. Data Partners, 2014. Seventh Point. Last accessed: June 11, 2015; URL http://www.seventhpoint.com/whitepaper/data-partners/. Department of Health and Human Services, 2013. Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the HITECH Act and the GINA Act; other Modifications to the HIPAA Rules (78 FR 5565), pp. 5565–5702. Domingo-Ferrer, 2002, Practical data-oriented microaggregation for statistical disclosure control, IEEE Transactions on Knowledge and Data Engineering, 14, 189, 10.1109/69.979982 Du, 2002, Building decision tree classifier on private data, vol. 14, 1 Dwork, 2006, Calibrating noise to sensitivity in private data analysis Fung, 2007, Anonymizing classification data for privacy preservation, IEEE Transactions on Knowledge Data Engineering, 19, 711, 10.1109/TKDE.2007.1015 Fung, 2010, Privacy-preserving data publishing: a survey of recent developments, ACM Computing Survey, 42, 14:1, 10.1145/1749603.1749605 Fung, 2012, Service-oriented architecture for high-dimensional private data mashup, IEEE Transactions on Services Computing, 5, 373, 10.1109/TSC.2011.13 Gates, 2014, Data is the new currency, 105 Gehrke, 2010, Programming with differential privacy: technical perspective, Communications of the ACM, 53, 10.1145/1810891.1810915 Gwebu, K.L., Wang, J., Xie, W., 2014. Understanding the cost associated with data security breaches. In: Proceedings of the 18th Pacific Asia Conference on Information Systems. Hore, B., Jammalamadaka, R.C., Mehrotra, S., 2007. Flexible anonymization for privacy preserving data publishing: a systematic search based approach. In: Proceedings of the Seventh SIAM International Conference on Data Mining. Hirshleifer, 2005 Hu, 2012, Towards law-aware semantic cloud policies with exceptions for data integration and protection, 26:1 Jurczyk, 2009, Distributed anonymization: achieving privacy for both data subjects and data providers, 191 Khokhar, 2014, Quantifying the costs and benefits of privacy-preserving health data publishing, Journal of Biomedical Informatics, 50, 107, 10.1016/j.jbi.2014.04.012 Kifer, 2009, Attacks on privacy and deFinetti’s theoerm, 127 Kim, 1986, A method for limiting disclosure in microdata based on random noise and transformation, 303 Kooiman, 1997 Kuner, 2011 LeFevre, 2006, Workload-aware anonymization, 277 Li, 2014, A theory of pricing private data, ACM Transactions on Database Systems, 39, 34:1, 10.1145/2691190.2691191 Lindell, 2009, Secure multiparty computation for privacy-preserving data mining, Journal of Privacy and Confidentiality, 1, 59, 10.29012/jpc.v1i1.566 Little, 1993, Statistical analysis of masked data, Journal of Official Statistics, 9, 407 Machanavajjhala, 2007, ℓ-Diversity: privacy beyond k-anonymity, ACM Transactions on Knowledge Discovery from Data, 1, 10.1145/1217299.1217302 McSherry, 2007, Mechanism design via differential privacy, 94 Mohammed, 2009, Anonymizing healthcare data: a case study on the blood transfusion service, 1285 Mohammed, 2010, Centralized and distributed anonymization for high-dimensional healthcare data, ACM Transactions on Knowledge Discovery from Data, 4, 18:1, 10.1145/1857947.1857950 Mohammed, 2011, Differentially private data release for data mining, 493 Mohammed, 2014, Secure two-party differentially private data release for vertically partitioned data, IEEE Transactions on Dependable and Secure Computing, 11, 59, 10.1109/TDSC.2013.22 OECD, 2013, Exploring the economics of personal data: a survey of methodologies for measuring monetary value, OECD Digital Economy Papers, 220 Personal Data Privacy and Security Act, 2011. Bill S.1151 – 112th Congress in the Senate of the United States. Quinlan, 1993 2009 Riederer, 2011, For sale: your data, 1 Roebuck, 2012 Romanosky, 2014, Privacy costs and personal data protection: economic and legal perspectives, Berkeley Technology Law Journal, 24 Romanosky, 2014, Empirical analysis of data breach litigation, Journal of Empirical Legal Studies, 11, 74, 10.1111/jels.12035 Samarati, 2001, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, IEEE Transactions on Knowledge and Data Engineering Skinner, 1994, Disclosure control for census microdata, Journal of Official Statistics, 10, 31 Takemura, 1999 Truta, 2003, Privacy and confidentiality management for the microaggregation disclosure control method: disclosure risk and information loss measures, 21 Waal, 1998, Optimal local suppression in microdata, Journal of Official Statistics, 14, 421 Waal, 1999, Information loss through global recoding and local suppression, Netherlands Official Statistics, 14, 17 Wixom, 2015 Wixom, 2015 Yao, 1982, Protocols for secure computations, 160