.

(k, l)-Clustering for Transactional Data Streams Anonymization

LAUR Repository

Show simple item record

dc.contributor.author Tekli, Jimmy
dc.contributor.author Al Bouna, Bechara
dc.contributor.author Issa, Youssef Bou
dc.contributor.author Kamradt, Marc
dc.contributor.author Haraty, Ramzi
dc.contributor.editor Su, Chunhua
dc.contributor.editor Kikuchi, Hiroaki
dc.date.accessioned 2019-03-18T12:08:48Z
dc.date.available 2019-03-18T12:08:48Z
dc.date.copyright 2018 en_US
dc.date.issued 2019-03-18
dc.identifier.isbn 9783319998077 en_US
dc.identifier.uri http://hdl.handle.net/10725/10229
dc.description.abstract In this paper, we address the correlation problem in the anonymization of transactional data streams. We propose a bucketization-based technique, entitled (k, l)-clustering to prevent such privacy breaches by ensuring that the same k individuals remain grouped together over the entire anonymized stream. We evaluate our algorithm in terms of utility by considering two different (k, l)-clustering approaches. en_US
dc.language.iso en en_US
dc.publisher Springer en_US
dc.subject Computer security -- Congresses en_US
dc.subject Computer networks -- Security measures -- Congresses en_US
dc.title (k, l)-Clustering for Transactional Data Streams Anonymization en_US
dc.type Conference Paper / Proceeding en_US
dc.author.school SAS en_US
dc.author.idnumber 199729410 en_US
dc.author.department Computer Science And Mathematics en_US
dc.description.physdesc cxiv, 624 pages : illustrations en_US
dc.publication.place Cham, Switzerland en_US
dc.keywords Data privacy en_US
dc.keywords Data stream en_US
dc.keywords Correlation en_US
dc.keywords Anonymization en_US
dc.description.bibliographiccitations Includes bibliographical references. en_US
dc.identifier.doi https://doi.org/10.1007/978-3-319-99807-7_35 en_US
dc.identifier.ctation Tekli, J., Al Bouna, B., Issa, Y. B., Kamradt, M., & Haraty, R. (2018, September). (k, l)-Clustering for Transactional Data Streams Anonymization. In International Conference on Information Security Practice and Experience (pp. 544-556). Springer, Cham. en_US
dc.author.email rharaty@lau.edu.lb en_US
dc.conference.date September 25-27, 2018 en_US
dc.conference.pages 544-556 en_US
dc.conference.place Tokyo, Japan en_US
dc.conference.subtitle 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, proceedings en_US
dc.conference.title Information security practice and experience en_US
dc.identifier.tou http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php en_US
dc.identifier.url https://link.springer.com/chapter/10.1007/978-3-319-99807-7_35 en_US
dc.note Part of the Lecture Notes in Computer Science book series (LNCS, volume 11125) en_US
dc.orcid.id https://orcid.org/0000-0002-6978-3627 en_US
dc.publication.date 2018 en_US
dc.author.affiliation Lebanese American University en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account