Detailed Information

Cited 3 time in webofscience Cited 5 time in scopus
Metadata Downloads

Toward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook

Full metadata record
DC Field Value Language
dc.contributor.authorMajeed, Abdul-
dc.contributor.authorKhan, Safiullah-
dc.contributor.authorHwang, Seong Oun-
dc.date.accessioned2022-07-17T03:40:16Z-
dc.date.available2022-07-17T03:40:16Z-
dc.date.created2022-07-11-
dc.date.issued2022-05-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/84974-
dc.description.abstractWith the continuous increase in avenues of personal data generation, privacy protection has become a hot research topic resulting in various proposed mechanisms to address this social issue. The main technical solutions for guaranteeing a user's privacy are encryption, pseudonymization, anonymization, differential privacy (DP), and obfuscation. Despite the success of other solutions, anonymization has been widely used in commercial settings for privacy preservation because of its algorithmic simplicity and low computing overhead. It facilitates unconstrained analysis of published data that DP and the other latest techniques cannot offer, and it is a mainstream solution for responsible data science. In this paper, we present a comprehensive analysis of clustering-based anonymization mechanisms (CAMs) that have been recently proposed to preserve both privacy and utility in data publishing. We systematically categorize the existing CAMs based on heterogeneous types of data (tables, graphs, matrixes, etc.), and we present an up-to-date, extensive review of existing CAMs and the metrics used for their evaluation. We discuss the superiority and effectiveness of CAMs over traditional anonymization mechanisms. We highlight the significance of CAMs in different computing paradigms, such as social networks, the internet of things, cloud computing, AI, and location-based systems with regard to privacy preservation. Furthermore, we present various proposed representative CAMs that compromise individual privacy, rather than safeguarding it. Besides, this article provides an extended knowledge (e.g., key assertion(s), strengths, weaknesses, clustering methods used in the anonymization process, and %age improvements in quantitative results) about each technique that provides a clear view of how much this topic has been investigated thus far, and what are the research gaps that seek pertinent solutions in the near future. Finally, we discuss the technical challenges of applying CAMs, and we suggest promising opportunities for future research. To the best of our knowledge, this is the first work to systematically cover current CAMs involving different data types and computing paradigms.-
dc.language영어-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.relation.isPartOfIEEE ACCESS-
dc.titleToward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000800158400001-
dc.identifier.doi10.1109/ACCESS.2022.3175219-
dc.identifier.bibliographicCitationIEEE ACCESS, v.10, pp.53066 - 53097-
dc.description.isOpenAccessY-
dc.identifier.scopusid2-s2.0-85130492882-
dc.citation.endPage53097-
dc.citation.startPage53066-
dc.citation.titleIEEE ACCESS-
dc.citation.volume10-
dc.contributor.affiliatedAuthorMajeed, Abdul-
dc.contributor.affiliatedAuthorKhan, Safiullah-
dc.contributor.affiliatedAuthorHwang, Seong Oun-
dc.type.docTypeArticle-
dc.subject.keywordAuthorData privacy-
dc.subject.keywordAuthorCams-
dc.subject.keywordAuthorPrivacy-
dc.subject.keywordAuthorSocial networking (online)-
dc.subject.keywordAuthorPublishing-
dc.subject.keywordAuthorData models-
dc.subject.keywordAuthorOutsourcing-
dc.subject.keywordAuthorPrivacy-
dc.subject.keywordAuthorutility-
dc.subject.keywordAuthoranonymization-
dc.subject.keywordAuthorpersonal data-
dc.subject.keywordAuthorclustering-
dc.subject.keywordAuthorsocial networks-
dc.subject.keywordAuthordifferential privacy-
dc.subject.keywordAuthorpseudonymization-
dc.subject.keywordAuthorencryption-
dc.subject.keywordAuthorde-anonymization-
dc.subject.keywordAuthorresponsible data science-
dc.subject.keywordAuthorartificial intelligence-
dc.subject.keywordPlusK-DEGREE ANONYMITY-
dc.subject.keywordPlusDE-ANONYMIZATION-
dc.subject.keywordPlusSOCIAL NETWORKS-
dc.subject.keywordPlusDIFFERENTIAL PRIVACY-
dc.subject.keywordPlusL-DIVERSITY-
dc.subject.keywordPlusPROTECTION-
dc.subject.keywordPlusSCHEME-
dc.subject.keywordPlusPERTURBATION-
dc.subject.keywordPlusSANITIZATION-
dc.subject.keywordPlusPREDICTION-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher MAJEED, ABDUL photo

MAJEED, ABDUL
College of IT Convergence (컴퓨터공학부(컴퓨터공학전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE