Cell-key Perturbation Data Privacy Procedure for Security Operations Center Team.
Supornpol NukrongsinChetneti Srisa-AnPublished in: JCSSE (2023)
Keyphrases
- data privacy
- data perturbation
- security concerns
- privacy preserving
- data security
- preserving privacy
- privacy preservation
- data sharing
- cloud computing
- statistical databases
- privacy preserving data mining
- data quality
- sensitive information
- privacy concerns
- sensitive data
- personal data
- original data
- individual privacy
- distributed data
- data protection
- differential privacy
- data warehouse
- privacy guarantees
- data mining
- security requirements
- data storage
- data access
- information security