A survey of privacy-preserving mechanisms for heterogeneous data types
Keywords:
privacy, privacy taxonomy, privacy-preserving mechanisms, heterogeneous data types, privacy toolsAbstract
Due to the pervasiveness of always connected devices, large amounts of heterogeneous data are continuously being collected. Beyond the benefits that accrue for the users, there are private and sensitive information that is exposed. Therefore, Privacy-Preserving Mechanisms (PPMs) are crucial to protect users’ privacy. In this paper, we perform a thorough study of the state of the art on the following topics: heterogeneous data types, PPMs, and tools for privacy protection. Building from the achieved knowledge, we propose a privacy taxonomy that establishes a relation between different types of data and suitable PPMs for the characteristics of those data types. Moreover, we perform a systematic analysis of solutions for privacy protection, by presenting and comparing privacy tools. From the performed analysis, we identify open challenges and future directions, namely, in the development of novel PPMs.
Downloads
References
Yan Z., Zhang P., Vasilakos A.V.A survey on trust management for Internet of Things J. Netw. Comput. Appl., 42 (2014), pp. 120-134.
Clement J. Online privacy in the United States - statistics & facts (2020).
Aldeen Y.A.A.S., Salleh M., Razzaque MA. A comprehensive review on privacy preserving data mining Springer Plus, 4 (1) (2015), p. 694.
Shah A., Gulati R. Privacy preserving data mining: Techniques classification and implications—A survey Int. J. Comput. Appl., 137 (12) (2016), pp. 40-46.
Mendes R., Vilela J.P. Privacy-preserving data mining: Methods, metrics, and applications IEEE Access, 5 (2017), pp. 10562-10582.
Shokri R., Theodorakopoulos G., Troncoso C., Hubaux J.-P., Le Boudec J.-Y. Protecting location privacy: Optimal strategy against localization attacks Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS ’12, Association for Computing Machinery, New York, NY, USA (2012), pp. 617-627, 10.1145/2382196.2382261.
Prasser F., Kohlmayer F. Putting statistical disclosure control into practice: The arx data anonymization tool Medical Data Privacy Handbook, Springer International Publishing, Cham (2015), pp. 111-148, 10.1007/978-3-319-23633-9_6.
Susilo, C. B., Jayanto, I., & Kusumawaty, I. (2021). Understanding digital technology trends in healthcare and preventive strategy. International Journal of Health & Medical Sciences, 4(3), 347-354. https://doi.org/10.31295/ijhms.v4n3.1769
Rinartha, K., & Suryasa, W. (2017). Comparative study for better result on query suggestion of article searching with MySQL pattern matching and Jaccard similarity. In 2017 5th International Conference on Cyber and IT Service Management (CITSM) (pp. 1-4). IEEE.
Rinartha, K., Suryasa, W., & Kartika, L. G. S. (2018). Comparative Analysis of String Similarity on Dynamic Query Suggestions. In 2018 Electrical Power, Electronics, Communications, Controls and Informatics Seminar (EECCIS) (pp. 399-404). IEEE.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.








