L-diversity: Privacy beyond k-anonymity

A Machanavajjhala, D Kifer, J Gehrke… - Acm transactions on …, 2007 - dl.acm.org
… The main idea behind l-diversity is the requirement that … k-anonymity can be adapted
to compute l-diverse tables (Section 5), and, in an experimental evaluation, we show that ldiversity

t-closeness: Privacy beyond k-anonymity and l-diversity

N Li, T Li, S Venkatasubramanian - 2007 IEEE 23rd …, 2006 - ieeexplore.ieee.org
… [12] proposed l-diversity. As we discuss in detail in Section 3, while l-diversity is an important
step beyond k-anonymity, it has a number of … Xiao and Tao [21] observe that l-diversity can- …

The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks

B Zhou, J Pei - Knowledge and information systems, 2011 - Springer
privacy against neighborhood attacks, we extend the conventional k-anonymity and l-diversity
In this paper, we focus our discussion on privacy models of k-anonymity and l-diversity, …

[PDF][PDF] A study on k-anonymity, l-diversity, and t-closeness techniques

K Rajendran, M Jayabalan, ME Rana - IJCSNS, 2017 - researchgate.net
… Overall, this paper displays several algorithms in proving the ability of l-diversity to
acknowledge the imperfections in k-anonymity to overcome homogeneity assault and background …

[書籍][B] Applications of k-Anonymity and -Diversity in Publishing Online Social Networks

N Li, SK Das - 2013 - Springer
… work that employed k-anonymity to protect users’ privacy when publishing … k-anonymity-based
techniques to preserve not only users’ identity privacy, but also user’s relationship privacy

Studying L-Diversity and K-Anonymity Over Datasets with Sensitive Fields

FS Nininahazwe - Artificial Intelligence and Security: 5th International …, 2019 - Springer
… In this paper, two PPDM techniques were presented which are k-anonymity and l-diversity. …
Although, it’s now clear that in matter of security l-diversity is better than k-anonymity for …

[PDF][PDF] Anonymity: A formalization of privacy-l-diversity

M Kern - Proceeding zum Seminar Future Internet (FI) …, 2013 - Citeseer
privacy definition of k-Anonymity and l-Diversity from relational data to social network data in
order to reach privacy … The k-anonymity and l-diversity approaches for privacy preservation …

L-cover: Preserving diversity by anonymity

L Zhang, L Wang, S Jajodia, A Brodsky - Secure Data Management: 6th …, 2009 - Springer
… between k-anonymity and ldiversity, which can be used to design better generalization
algorithms in terms of efficiency and data utility, while guaranteeing the property of l-diversity

Automated k-Anonymization and l-Diversity for Shared Data Privacy

AVDM Kayem, CT Vester, C Meinel - … 2016, Porto, Portugal, September 5-8 …, 2016 - Springer
… modified k-anonymity algorithm in a manner that ensures security against linking attacks. In
the second step, we extend the k-anonymity algorithm based on the concepts of l-diversity to …

[HTML][HTML] Improved l-diversity: scalable anonymization approach for privacy preserving big data publishing

BB Mehta, UP Rao - Journal of King Saud University-Computer and …, 2022 - Elsevier
… of existing privacy preserving data publishing approaches, therefore, we propose Improved
l-Diversity (ImSLD) approach which is the extension of Improved Scalable k-Anonymity (…