{"id":"https://openalex.org/W2033166113","doi":"https://doi.org/10.1109/trustcom.2013.235","title":"Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud","display_name":"Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2033166113","doi":"https://doi.org/10.1109/trustcom.2013.235","mag":"2033166113"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.235","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076120553","display_name":"Xuyun Zhang","orcid":"https://orcid.org/0000-0001-7353-4159"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xuyun Zhang","raw_affiliation_strings":["Fac. of Eng. & IT, Univ. of Technol., Sydney, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Fac. of Eng. & IT, Univ. of Technol., Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100353377","display_name":"Chang Liu","orcid":"https://orcid.org/0000-0003-4959-7541"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Chang Liu","raw_affiliation_strings":["Fac. of Eng. & IT, Univ. of Technol., Sydney, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Fac. of Eng. & IT, Univ. of Technol., Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082256444","display_name":"\u202aSurya Nepal\u202c","orcid":"https://orcid.org/0000-0002-3289-6599"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I4210128581","display_name":"Information and Communication Technologies Centre","ror":"https://ror.org/034x2fx50","country_code":"AU","type":"facility","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4210128581","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Surya Nepal","raw_affiliation_strings":["[ICT Centre, CSIRO, Sydney, NSW, Australia]"],"affiliations":[{"raw_affiliation_string":"[ICT Centre, CSIRO, Sydney, NSW, Australia]","institution_ids":["https://openalex.org/I1292875679","https://openalex.org/I4210128581"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101954235","display_name":"Chi Yang","orcid":"https://orcid.org/0000-0002-6770-4593"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Chi Yang","raw_affiliation_strings":["Fac. of Eng. & IT, Univ. of Technol., Sydney, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Fac. of Eng. & IT, Univ. of Technol., Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038791483","display_name":"Wanchun Dou","orcid":"https://orcid.org/0000-0003-4833-2023"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wanchun Dou","raw_affiliation_strings":["State Key Lab. for Novel Software Tech., Nanjing Univ., Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Lab. for Novel Software Tech., Nanjing Univ., Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101808353","display_name":"Jinjun Chen","orcid":"https://orcid.org/0000-0003-1677-9525"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jinjun Chen","raw_affiliation_strings":["Fac. of Eng. & IT, Univ. of Technol., Sydney, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Fac. of Eng. & IT, Univ. of Technol., Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.618,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":34,"citation_normalized_percentile":{"value":0.869354,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9968,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Internet Users' Information Privacy Concerns","score":0.9521,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.6860098},{"id":"https://openalex.org/keywords/data-anonymization","display_name":"Data anonymization","score":0.6284713},{"id":"https://openalex.org/keywords/anonymization","display_name":"Anonymization","score":0.603901},{"id":"https://openalex.org/keywords/k-anonymity","display_name":"k-Anonymity","score":0.514929},{"id":"https://openalex.org/keywords/privacy-preserving-computation","display_name":"Privacy-Preserving Computation","score":0.509671},{"id":"https://openalex.org/keywords/data-privacy","display_name":"Data Privacy","score":0.507309},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential Privacy","score":0.501243}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8599412},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.8403071},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.80948126},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.6860098},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.66474545},{"id":"https://openalex.org/C2776945810","wikidata":"https://www.wikidata.org/wiki/Q17006654","display_name":"Data anonymization","level":3,"score":0.6284713},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4783004},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4745118},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.43603942},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.430214},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.42861128},{"id":"https://openalex.org/C2777706471","wikidata":"https://www.wikidata.org/wiki/Q17061432","display_name":"k-anonymity","level":3,"score":0.42699674},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.33732954},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20066738},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15843663},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.235","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":27,"referenced_works":["https://openalex.org/W1503506375","https://openalex.org/W1656486128","https://openalex.org/W1967831627","https://openalex.org/W1971774955","https://openalex.org/W1979005794","https://openalex.org/W1989135185","https://openalex.org/W2019376841","https://openalex.org/W2034616054","https://openalex.org/W2038873345","https://openalex.org/W2081416313","https://openalex.org/W2107927452","https://openalex.org/W2118944554","https://openalex.org/W2132678785","https://openalex.org/W2134167315","https://openalex.org/W2134894205","https://openalex.org/W2135581534","https://openalex.org/W2142406320","https://openalex.org/W2144326136","https://openalex.org/W2151930506","https://openalex.org/W2157355837","https://openalex.org/W2159024459","https://openalex.org/W2160036998","https://openalex.org/W2161030490","https://openalex.org/W2164649498","https://openalex.org/W2164812149","https://openalex.org/W2170247462","https://openalex.org/W2949363019"],"related_works":["https://openalex.org/W4385403010","https://openalex.org/W3148376640","https://openalex.org/W3008871499","https://openalex.org/W2975449868","https://openalex.org/W2741549564","https://openalex.org/W2735807361","https://openalex.org/W2306863078","https://openalex.org/W2098331493","https://openalex.org/W2073216087","https://openalex.org/W2061451387"],"abstract_inverted_index":{"In":[0,106],"big":[1,82,125],"data":[2,4,17,29,36,47,83],"applications,":[3],"privacy":[5,50],"is":[6,40],"one":[7],"of":[8,74,98,148,163],"the":[9,154,159],"most":[10],"concerned":[11],"issues":[12],"because":[13],"processing":[14],"large-scale":[15],"privacy-sensitive":[16],"sets":[18,48],"often":[19],"requires":[20],"computation":[21,146],"power":[22],"provided":[23],"by":[24,143],"public":[25],"cloud":[26],"services.":[27],"Sub-tree":[28],"anonymization,":[30],"achieving":[31],"a":[32,41,111],"good":[33],"trade-off":[34],"between":[35],"utility":[37],"and":[38,55,89,117,137,161],"distortion,":[39],"widely":[42],"adopted":[43],"scheme":[44,166],"to":[45,62,139],"anonymize":[46],"for":[49,69,95,120,133],"preservation.":[51],"Top-Down":[52],"Specialization":[53],"(TDS)":[54],"Bottom-Up":[56],"Generalization":[57],"(BUG)":[58],"are":[59,103],"two":[60,134],"ways":[61],"fulfill":[63],"sub-tree":[64,70,122,164],"anonymization.":[65],"However,":[66],"existing":[67,168],"approaches":[68],"anonymization":[71,123,165],"fall":[72],"short":[73],"parallelization":[75],"capability,":[76],"thereby":[77],"lacking":[78],"scalability":[79,142,160],"in":[80],"handling":[81],"on":[84],"cloud.":[85,149],"Still,":[86],"both":[87],"TDS":[88,116],"BUG":[90,118],"suffer":[91],"from":[92],"poor":[93],"performance":[94],"certain":[96],"value":[97],"k-anonymity":[99],"parameter":[100],"if":[101],"they":[102],"utilized":[104],"individually.":[105],"this":[107],"paper,":[108],"we":[109,128],"propose":[110],"hybrid":[112,155],"approach":[113,156],"that":[114,153],"combines":[115],"together":[119],"efficient":[121],"over":[124,167],"data.":[126],"Further,":[127],"design":[129],"MapReduce":[130],"based":[131],"algorithms":[132],"components":[135],"(TDS":[136],"BUG)":[138],"gain":[140],"high":[141],"exploiting":[144],"powerful":[145],"capability":[147],"Experiment":[150],"evaluations":[151],"demonstrate":[152],"significantly":[157],"improves":[158],"efficiency":[162],"approaches.":[169]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2033166113","counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":6},{"year":2013,"cited_by_count":2}],"updated_date":"2024-11-22T11:00:54.974368","created_date":"2016-06-24"}