Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (9)
  • Open Access

    ARTICLE

    A Study on Re-Identification of Natural Language Data Considering Korean Attributes

    Segyeong Bang#, Soeun Kim#, Gaeun Ahn, Hyemin Hong, Junhyoung Oh*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4629-4643, 2025, DOI:10.32604/cmc.2025.068221 - 23 October 2025

    Abstract This study analyzes the risks of re-identification in Korean text data and proposes a secure, ethical approach to data anonymization. Following the ‘Lee Luda’ AI chatbot incident, concerns over data privacy have increased. The Personal Information Protection Commission of Korea conducted inspections of AI services, uncovering 850 cases of personal information in user input datasets, highlighting the need for pseudonymization standards. While current anonymization techniques remove personal data like names, phone numbers, and addresses, linguistic features such as writing habits and language-specific traits can still identify individuals when combined with other data. To address this,… More >

  • Open Access

    ARTICLE

    A Dynamic SDN-Based Address Hopping Model for IoT Anonymization

    Zesheng Xi1,2,#, Chuan He1,3,#, Yunfan Wang1,3,#, Bo Zhang1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2545-2565, 2025, DOI:10.32604/cmes.2025.066822 - 31 August 2025

    Abstract The increasing reliance on interconnected Internet of Things (IoT) devices has amplified the demand for robust anonymization strategies to protect device identities and ensure secure communication. However, traditional anonymization methods for IoT networks often rely on static identity models, making them vulnerable to inference attacks through long-term observation. Moreover, these methods tend to sacrifice data availability to protect privacy, limiting their practicality in real-world applications. To overcome these limitations, we propose a dynamic device identity anonymization framework using Moving Target Defense (MTD) principles implemented via Software-Defined Networking (SDN). In our model, the SDN controller periodically… More >

  • Open Access

    ARTICLE

    Adversarial Perturbation for Sensor Data Anonymization: Balancing Privacy and Utility

    Tatsuhito Hasegawa#,*, Kyosuke Fujino#

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2429-2454, 2025, DOI:10.32604/cmc.2025.066270 - 03 July 2025

    Abstract Recent advances in wearable devices have enabled large-scale collection of sensor data across healthcare, sports, and other domains but this has also raised critical privacy concerns, especially under tightening regulations such as the General Data Protection Regulation (GDPR), which explicitly restrict the processing of data that can re-identify individuals. Although existing anonymization approaches such as the Anonymizing AutoEncoder (AAE) can reduce the risk of re-identification, they often introduce substantial waveform distortions and fail to preserve information beyond a single classification task (e.g., human activity recognition). This study proposes a novel sensor data anonymization method based… More >

  • Open Access

    ARTICLE

    Design and Application of a New Distributed Dynamic Spatio-Temporal Privacy Preserving Mechanisms

    Jiacheng Xiong1, Xingshu Chen1,2,3,*, Xiao Lan2,3, Liangguo Chen1,2

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2273-2303, 2025, DOI:10.32604/cmc.2025.063984 - 03 July 2025

    Abstract In the era of big data, the growing number of real-time data streams often contains a lot of sensitive privacy information. Releasing or sharing this data directly without processing will lead to serious privacy information leakage. This poses a great challenge to conventional privacy protection mechanisms (CPPM). The existing data partitioning methods ignore the number of data replications and information exchanges, resulting in complex distance calculations and inefficient indexing for high-dimensional data. Therefore, CPPM often fails to meet the stringent requirements of efficiency and reliability, especially in dynamic spatiotemporal environments. Addressing this concern, we proposed… More >

  • Open Access

    ARTICLE

    A New Privacy-Preserving Data Publishing Algorithm Utilizing Connectivity-Based Outlier Factor and Mondrian Techniques

    Burak Cem Kara1,2,*, Can Eyüpoğlu1

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1515-1535, 2023, DOI:10.32604/cmc.2023.040274 - 30 August 2023

    Abstract Developing a privacy-preserving data publishing algorithm that stops individuals from disclosing their identities while not ignoring data utility remains an important goal to achieve. Because finding the trade-off between data privacy and data utility is an NP-hard problem and also a current research area. When existing approaches are investigated, one of the most significant difficulties discovered is the presence of outlier data in the datasets. Outlier data has a negative impact on data utility. Furthermore, k-anonymity algorithms, which are commonly used in the literature, do not provide adequate protection against outlier data. In this study, a… More >

  • Open Access

    ARTICLE

    Data De-identification Framework

    Junhyoung Oh1, Kyungho Lee2,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3579-3606, 2023, DOI:10.32604/cmc.2023.031491 - 31 October 2022

    Abstract As technology develops, the amount of information being used has increased a lot. Every company learns big data to provide customized services with its customers. Accordingly, collecting and analyzing data of the data subject has become one of the core competencies of the companies. However, when collecting and using it, the authority of the data subject may be violated. The data often identifies its subject by itself, and even if it is not a personal information that infringes on an individual’s authority, the moment it is connected, it becomes important and sensitive personal information that… More >

  • Open Access

    ARTICLE

    Slicing-Based Enhanced Method for Privacy-Preserving in Publishing Big Data

    Mohammed BinJubier1, Mohd Arfian Ismail1, Abdulghani Ali Ahmed2,*, Ali Safaa Sadiq3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3665-3686, 2022, DOI:10.32604/cmc.2022.024663 - 29 March 2022

    Abstract Publishing big data and making it accessible to researchers is important for knowledge building as it helps in applying highly efficient methods to plan, conduct, and assess scientific research. However, publishing and processing big data poses a privacy concern related to protecting individuals’ sensitive information while maintaining the usability of the published data. Several anonymization methods, such as slicing and merging, have been designed as solutions to the privacy concerns for publishing big data. However, the major drawback of merging and slicing is the random permutation procedure, which does not always guarantee complete protection against… More >

  • Open Access

    ARTICLE

    Machine Learning Privacy Aware Anonymization Using MapReduce Based Neural Network

    U. Selvi*, S. Pushpa

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 1185-1196, 2022, DOI:10.32604/iasc.2022.020164 - 22 September 2021

    Abstract Due to the recent advancement in technologies, a huge amount of data is generated where individual private information needs to be preserved. A proper Anonymization algorithm with increased Data utility is required to protect individual privacy. However, preserving privacy of individuals whileprocessing huge amount of data is a challenging task, as the data contains certain sensitive information. Moreover, scalability issue in handling a large dataset is found in using existing framework. Many an Anonymization algorithm for Big Data have been developed and under research. We propose a method of applying Machine Learning techniques to protect More >

  • Open Access

    ARTICLE

    Research on Privacy Preserving Data Mining

    Pingshui Wang1,*, Tao Chen1,2, Zecheng Wang1

    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 61-68, 2019, DOI:10.32604/jihpp.2019.05943

    Abstract In recent years, with the explosive development in Internet, data storage and data processing technologies, privacy preservation has been one of the greater concerns in data mining. A number of methods and techniques have been developed for privacy preserving data mining. This paper provided a wide survey of different privacy preserving data mining algorithms and analyzed the representative techniques for privacy preservation. The existing problems and directions for future research are also discussed. More >

Displaying 1-10 on page 1 of 9. Per Page