Data privacy: foundations, new developments and the big data challenge
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2017]
|
Schriftenreihe: | Studies in Big Data
Volume 28 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xiv, 269 Seiten Illustrationen, Diagramme |
ISBN: | 9783319573564 |
ISSN: | 2197-6503 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV044879496 | ||
003 | DE-604 | ||
005 | 20201008 | ||
007 | t | ||
008 | 180323s2017 a||| |||| 00||| eng d | ||
020 | |a 9783319573564 |9 978-3-319-57356-4 | ||
035 | |a (OCoLC)1014391721 | ||
035 | |a (DE-599)BVBBV044879496 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-384 |a DE-355 | ||
082 | 0 | |a 006.3 |2 23 | |
084 | |a PZ 4600 |0 (DE-625)141181: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Torra, Vicenç |e Verfasser |0 (DE-588)1127080679 |4 aut | |
245 | 1 | 0 | |a Data privacy |b foundations, new developments and the big data challenge |c Vicenç Torra |
264 | 1 | |a Cham |b Springer |c [2017] | |
300 | |a xiv, 269 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Studies in Big Data |v Volume 28 |x 2197-6503 | |
650 | 4 | |a Engineering | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Computational intelligence | |
650 | 4 | |a Computational Intelligence | |
650 | 4 | |a Artificial Intelligence (incl. Robotics) | |
650 | 4 | |a Ingenieurwissenschaften | |
650 | 4 | |a Künstliche Intelligenz | |
650 | 0 | 7 | |a Data Mining |0 (DE-588)4428654-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 3 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-319-57358-8 |
830 | 0 | |a Studies in Big Data |v Volume 28 |w (DE-604)BV041647338 |9 28 | |
856 | 4 | 2 | |m Digitalisierung UB Augsburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030273749&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-030273749 |
Datensatz im Suchindex
_version_ | 1804178416602185728 |
---|---|
adam_text | 1 Introduction........................................................... 1
1.1 Motivations for Data Privacy..................................... 2
1.2 Privacy and Society............................................. 5
1.3 Terminology.................................................. 6
1.3.1 The Framework............................................. 7
1.3.2 Anonymity and Unîinkability............................... 8
1.3.3 Disclosure............................................... 10
1.3.4 Undetectability and Unobservability...................... 13
1.3.5 Pseudonyms and Identity.................................. 14
1.3.6 Transparency............................................. 16
1.4 Privacy and Disclosure.......................................... 17
1.5 Privacy by Design............................................. 17
References......................................................... 19
2 Machine and Statistical Learning............................... 23
2.1 Classification of Techniques.................................... 24
2.2 Supervised Learning............................................. 25
2.2.1 Classification......................................... 25
2.2.2 Regression............................................... 26
2.2.3 Validation of Results: k-Fold Cross-Validation........... 27
2.3 Unsupervised Learning........................................... 28
2.3.1 Clustering............................................... 28
2.3.2 Association Rules........................................ 44
2.3.3 Expectation-Maximization Algorithm....................... 51
References......................................................... 53
3 On the Classification of Protection Procedures........................ 55
3.1 Dimensions...................................................... 55
3.1.1 On Whose Privacy Is Being Sought......................... 56
3.1.2 On the Computations to be Done........................... 58
3.1.3 On the Number of Data Sources............................ 60
3.1.4 Knowledge Intensive Data Privacy......................... 61
3.1.5 Other Dimensions and Discussion.......................... 62
3.1.6 Summary................................................. 63
64
65
66
66
69
70
71
76
80
83
85
89
90
90
95
97
97
98
101
101
104
108
108
111
111
114
115
115
116
118
118
121
122
123
125
126
127
127
131
133
134
135
3.2 Respondent and Holder Privacy.......................
3.3 Data-Driven Methods.................................
3.4 Computation-Driven Methods..........................
3.4.1 Single Database: Differential Privacy........
3.4.2 Multiple Databases: Cryptographic Approaches
3.4.3 Discussion...................................
3.5 Result-Driven Approaches............................
3.6 Tabular Data........................................
3.6.1 Cell Suppression.............................
3.6.2 Controlled Tabular Adjustment................
References...............................................
User’s Privacy...........................................
4.1 User Privacy in Communications......................
4.1.1 Protecting the Identity of the User..........
4.1.2 Protecting the Data of the User..............
4.2 User Privacy in Information Retrieval...............
4.2.1 Protecting the Identity of the User..........
4.2.2 Protecting the Query of the User.............
4.3 Private Information Retrieval.......................
4.3.1 Information-Theoretic PIR with k Databases. . .
4.3.2 Computational PIR . .........................
4.3.3 Other Contexts...............................
References...............................................
Privacy Models and Disclosure Risk Measures..............
5.1 Definition and Controversies........................
5.1.1 A Boolean or Measurable Condition............
5.2 Attribute Disclosure................................
5.2.1 Attribute Disclosure for a Numerical Variable .
5.2.2 Attribute Disclosure for a Categorical Variable.
5.3 Identity Disclosure.................................
5.3.1 An Scenario for Identity Disclosure..........
5.3.2 Measures for Identity Disclosure.............
5.3.3 Uniqueness...................................
5.3.4 Reidentification.............................
5.3.5 The Worst-Case Scenario......................
5.4 Matching and Integration: A Database Based Approach
5.4.1 Heterogenous Distributed Databases...........
5.4.2 Data Integration.............................
5.4.3 Schema Matching..............................
5.4.4 Data Matching................................
5.4.5 Preprocessing................................
5.4.6 Indexing and Blocking........................
Contents x^i
5.4.7 Record Pair Comparison: Distances and Similarities..... 136
5.4.8 Classification of Record Pairs ........................ 140
5.5 Probabilistic Record Linkage.................................... 142
5.5.1 Alternative Expressions for Decision Rules............... 152
5.5.2 Computation of Rp(a,b)................................... 156
5.5.3 Estimation of the Probabilities.......................... 158
5.5.4 Extensions for Computing Probabilities................... 160
5.5.5 Final Notes.............................................. 163
5.6 Distance-Based Record Linkage................................... 163
5.6.1 Weighted Distances....................................... 164
5.6.2 Distance and Normalization............................... 167
5.6.3 Parameter Determination for Record Linkage............... 168
5.7 Record Linkage Without Common Variables....................... 171
5.8 ¿-Anonymity and Other Boolean Conditions
for Identity Disclosure....................................... 172
5.8.1 ¿-Anonymity and Anonymity Sets: ¿-Confusion............. . 173
5.8.2 ¿-Anonymity and Attribute Disclosure: Attacks............ 176
5.8.3 Other Related Approaches to ¿-Anonymity................. 178
5.9 Discussion on Record Linkage.................................... 178
5.9.1 Formalization of Reidentification Algorithms............. 178
5.9.2 Comparison of Record Linkage Algorithms.................. 179
5.9.3 Disclosure Risk and Big Data............................. 180
5.9.4 Some Guidelines and Research Issues...................... 182
References, . . ..................................................... 183
6 Masking Methods...................................................... 191
6.1 Perturbative Methods.......................................... 193
6.1.1 Data and Rank Swapping................................... 193
6.1.2 Microaggregation......................................... 200
6.1.3 Additive and Multiplicative Noise........................ 212
6.1.4 PRAM.................................................... 214
6.1.5 Lossy Compression and Other Transform-Based
Method................................................. 217
6.2 Non-perturbative Methods........................................ 219
6.2.1 Generalization and Recoding. ........................... 219
6.2.2 Suppression............................................ 220
6.3 Synthetic Data Generators....................................... 220
6.4 Masking Methods and ¿-anonymity................................. 223
6.4.1 Mondrian................................................. 224
6.4.2 Algorithms for ¿-anonymity: Variants and Big Data...... 225
6.5 Data Protection Procedures for Constrained Data................. 226
6.5.1 Types of Constraints..................................... 227
6.6 Masking Methods and Big Data................................ 230
References........................................................ 231
xiv Contents
7 Information Loss: Evaluation and Measures............................. 239
7.1 Generic Versus Specific Information Loss........................ 239
7.2 Information Loss Measures....................................... 240
7.3 Generic Information Loss Measures............................... 242
7.3.1 Numerical Data........................................... 242
7.3.2 Categorical Data......................................... 245
7.4 Specific Information Loss....................................... 248
7.4.1 Classification-Based Information Loss.................... 248
7.4.2 Regression-Based Information Loss........................ 249
7.4.3 Clustering-Based Information Loss........................ 249
7.5 Information Loss and Big Data................................... 250
References........................................................... 251
8 Selection of Masking Methods.......................................... 255
8.1 Aggregation: A Score............................................ 255
8.2 Visualization: R-U Maps......................................... 256
8.3 Optimization and Postmasking.................................... 257
References........................................................... 258
9 Conclusions........................................................... 259
Reference............................................................ 260
Index................................................................... 261
|
any_adam_object | 1 |
author | Torra, Vicenç |
author_GND | (DE-588)1127080679 |
author_facet | Torra, Vicenç |
author_role | aut |
author_sort | Torra, Vicenç |
author_variant | v t vt |
building | Verbundindex |
bvnumber | BV044879496 |
classification_rvk | PZ 4600 ST 276 |
ctrlnum | (OCoLC)1014391721 (DE-599)BVBBV044879496 |
dewey-full | 006.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3 |
dewey-search | 006.3 |
dewey-sort | 16.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Rechtswissenschaft Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02154nam a2200529zcb4500</leader><controlfield tag="001">BV044879496</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20201008 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">180323s2017 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319573564</subfield><subfield code="9">978-3-319-57356-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1014391721</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044879496</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 4600</subfield><subfield code="0">(DE-625)141181:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Torra, Vicenç</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1127080679</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data privacy</subfield><subfield code="b">foundations, new developments and the big data challenge</subfield><subfield code="c">Vicenç Torra</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiv, 269 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Studies in Big Data</subfield><subfield code="v">Volume 28</subfield><subfield code="x">2197-6503</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence (incl. Robotics)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Künstliche Intelligenz</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-57358-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Studies in Big Data</subfield><subfield code="v">Volume 28</subfield><subfield code="w">(DE-604)BV041647338</subfield><subfield code="9">28</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Augsburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030273749&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030273749</subfield></datafield></record></collection> |
id | DE-604.BV044879496 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:03:38Z |
institution | BVB |
isbn | 9783319573564 |
issn | 2197-6503 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030273749 |
oclc_num | 1014391721 |
open_access_boolean | |
owner | DE-384 DE-355 DE-BY-UBR |
owner_facet | DE-384 DE-355 DE-BY-UBR |
physical | xiv, 269 Seiten Illustrationen, Diagramme |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Springer |
record_format | marc |
series | Studies in Big Data |
series2 | Studies in Big Data |
spelling | Torra, Vicenç Verfasser (DE-588)1127080679 aut Data privacy foundations, new developments and the big data challenge Vicenç Torra Cham Springer [2017] xiv, 269 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Studies in Big Data Volume 28 2197-6503 Engineering Artificial intelligence Computational intelligence Computational Intelligence Artificial Intelligence (incl. Robotics) Ingenieurwissenschaften Künstliche Intelligenz Data Mining (DE-588)4428654-5 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Datenschutz (DE-588)4011134-9 s Datensicherung (DE-588)4011144-1 s Privatsphäre (DE-588)4123980-5 s Data Mining (DE-588)4428654-5 s DE-604 Erscheint auch als Online-Ausgabe 978-3-319-57358-8 Studies in Big Data Volume 28 (DE-604)BV041647338 28 Digitalisierung UB Augsburg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030273749&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Torra, Vicenç Data privacy foundations, new developments and the big data challenge Studies in Big Data Engineering Artificial intelligence Computational intelligence Computational Intelligence Artificial Intelligence (incl. Robotics) Ingenieurwissenschaften Künstliche Intelligenz Data Mining (DE-588)4428654-5 gnd Datensicherung (DE-588)4011144-1 gnd Datenschutz (DE-588)4011134-9 gnd Privatsphäre (DE-588)4123980-5 gnd |
subject_GND | (DE-588)4428654-5 (DE-588)4011144-1 (DE-588)4011134-9 (DE-588)4123980-5 |
title | Data privacy foundations, new developments and the big data challenge |
title_auth | Data privacy foundations, new developments and the big data challenge |
title_exact_search | Data privacy foundations, new developments and the big data challenge |
title_full | Data privacy foundations, new developments and the big data challenge Vicenç Torra |
title_fullStr | Data privacy foundations, new developments and the big data challenge Vicenç Torra |
title_full_unstemmed | Data privacy foundations, new developments and the big data challenge Vicenç Torra |
title_short | Data privacy |
title_sort | data privacy foundations new developments and the big data challenge |
title_sub | foundations, new developments and the big data challenge |
topic | Engineering Artificial intelligence Computational intelligence Computational Intelligence Artificial Intelligence (incl. Robotics) Ingenieurwissenschaften Künstliche Intelligenz Data Mining (DE-588)4428654-5 gnd Datensicherung (DE-588)4011144-1 gnd Datenschutz (DE-588)4011134-9 gnd Privatsphäre (DE-588)4123980-5 gnd |
topic_facet | Engineering Artificial intelligence Computational intelligence Computational Intelligence Artificial Intelligence (incl. Robotics) Ingenieurwissenschaften Künstliche Intelligenz Data Mining Datensicherung Datenschutz Privatsphäre |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030273749&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV041647338 |
work_keys_str_mv | AT torravicenc dataprivacyfoundationsnewdevelopmentsandthebigdatachallenge |