Reference Hub3
A State-of-the-Art Review of Data Stream Anonymization Schemes

A State-of-the-Art Review of Data Stream Anonymization Schemes

Aderonke B. Sakpere, Anne V. D. M. Kayem
Copyright: © 2014 |Pages: 27
ISBN13: 9781466661585|ISBN10: 1466661585|EISBN13: 9781466661592
DOI: 10.4018/978-1-4666-6158-5.ch003
Cite Chapter Cite Chapter

MLA

Sakpere, Aderonke B., and Anne V. D. M. Kayem. "A State-of-the-Art Review of Data Stream Anonymization Schemes." Information Security in Diverse Computing Environments, edited by Anne Kayem and Christoph Meinel, IGI Global, 2014, pp. 24-50. https://doi.org/10.4018/978-1-4666-6158-5.ch003

APA

Sakpere, A. B. & Kayem, A. V. (2014). A State-of-the-Art Review of Data Stream Anonymization Schemes. In A. Kayem & C. Meinel (Eds.), Information Security in Diverse Computing Environments (pp. 24-50). IGI Global. https://doi.org/10.4018/978-1-4666-6158-5.ch003

Chicago

Sakpere, Aderonke B., and Anne V. D. M. Kayem. "A State-of-the-Art Review of Data Stream Anonymization Schemes." In Information Security in Diverse Computing Environments, edited by Anne Kayem and Christoph Meinel, 24-50. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-6158-5.ch003

Export Reference

Mendeley
Favorite

Abstract

Streaming data emerges from different electronic sources and needs to be processed in real time with minimal delay. Data streams can generate hidden and useful knowledge patterns when mined and analyzed. In spite of these benefits, the issue of privacy needs to be addressed before streaming data is released for mining and analysis purposes. In order to address data privacy concerns, several techniques have emerged. K-anonymity has received considerable attention over other privacy preserving techniques because of its simplicity and efficiency in protecting data. Yet, k-anonymity cannot be directly applied on continuous data (data streams) because of its transient nature. In this chapter, the authors discuss the challenges faced by k-anonymity algorithms in enforcing privacy on data streams and review existing privacy techniques for handling data streams.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.