{"id":"https://openalex.org/W4389610863","doi":"https://doi.org/10.1109/icspis60075.2023.10343672","title":"DiffT: A Novel Approach for Privacy Preserving Data Analytics","display_name":"DiffT: A Novel Approach for Privacy Preserving Data Analytics","publication_year":2023,"publication_date":"2023-11-08","ids":{"openalex":"https://openalex.org/W4389610863","doi":"https://doi.org/10.1109/icspis60075.2023.10343672"},"language":"en","primary_location":{"id":"doi:10.1109/icspis60075.2023.10343672","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icspis60075.2023.10343672","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th International Conference on Signal Processing and Information Security (ICSPIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093471982","display_name":"Ketaki Kadlaskar","orcid":null},"institutions":[{"id":"https://openalex.org/I1331084196","display_name":"National Forensic Sciences University","ror":"https://ror.org/03fbv3w59","country_code":"IN","type":"education","lineage":["https://openalex.org/I1331084196"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ketaki Kadlaskar","raw_affiliation_strings":["National Forensic Sciences University,School of Cybersecurity and Digital Forensics,Gandhinagar,India","School of Cybersecurity and Digital Forensics, National Forensic Sciences University, Gandhinagar, India"],"affiliations":[{"raw_affiliation_string":"National Forensic Sciences University,School of Cybersecurity and Digital Forensics,Gandhinagar,India","institution_ids":["https://openalex.org/I1331084196"]},{"raw_affiliation_string":"School of Cybersecurity and Digital Forensics, National Forensic Sciences University, Gandhinagar, India","institution_ids":["https://openalex.org/I1331084196"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023454711","display_name":"Mukti Padhya","orcid":"https://orcid.org/0000-0002-0498-4188"},"institutions":[{"id":"https://openalex.org/I1331084196","display_name":"National Forensic Sciences University","ror":"https://ror.org/03fbv3w59","country_code":"IN","type":"education","lineage":["https://openalex.org/I1331084196"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mukti Padhya","raw_affiliation_strings":["National Forensic Sciences University,School of Cybersecurity and Digital Forensics,Gandhinagar,India","School of Cybersecurity and Digital Forensics, National Forensic Sciences University, Gandhinagar, India"],"affiliations":[{"raw_affiliation_string":"National Forensic Sciences University,School of Cybersecurity and Digital Forensics,Gandhinagar,India","institution_ids":["https://openalex.org/I1331084196"]},{"raw_affiliation_string":"School of Cybersecurity and Digital Forensics, National Forensic Sciences University, Gandhinagar, India","institution_ids":["https://openalex.org/I1331084196"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5093471982"],"corresponding_institution_ids":["https://openalex.org/I1331084196"],"apc_list":null,"apc_paid":null,"fwci":0.1748,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58675467,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"17","issue":null,"first_page":"71","last_page":"76"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8106250762939453},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.696477472782135},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.5861159563064575},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5451516509056091},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.528306245803833},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.521934986114502},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.46265631914138794},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4324916899204254},{"id":"https://openalex.org/keywords/closeness","display_name":"Closeness","score":0.4239766299724579},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3679409325122833},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30228227376937866}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8106250762939453},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.696477472782135},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.5861159563064575},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5451516509056091},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.528306245803833},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.521934986114502},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.46265631914138794},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4324916899204254},{"id":"https://openalex.org/C2779545769","wikidata":"https://www.wikidata.org/wiki/Q5135364","display_name":"Closeness","level":2,"score":0.4239766299724579},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3679409325122833},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30228227376937866},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icspis60075.2023.10343672","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icspis60075.2023.10343672","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th International Conference on Signal Processing and Information Security (ICSPIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.44999998807907104,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1977843657","https://openalex.org/W2136114025","https://openalex.org/W2747680362","https://openalex.org/W3043314597","https://openalex.org/W3116008906","https://openalex.org/W3138657417","https://openalex.org/W3184705465","https://openalex.org/W4297666443","https://openalex.org/W4313644996","https://openalex.org/W4317438186","https://openalex.org/W6799190090","https://openalex.org/W6849200951"],"related_works":["https://openalex.org/W4304208041","https://openalex.org/W4315488958","https://openalex.org/W3176515490","https://openalex.org/W3185918024","https://openalex.org/W3138333794","https://openalex.org/W2773408865","https://openalex.org/W4226426276","https://openalex.org/W2083287929","https://openalex.org/W4241535341","https://openalex.org/W2735874745"],"abstract_inverted_index":{"The":[0,51,124,178],"use":[1,23],"of":[2,10,24,86,118,181,206],"data":[3,26,45,100],"analytics":[4,46,101,199],"has":[5],"led":[6],"to":[7,30,38,43,71,92,185],"the":[8,22,83,174,187,195],"creation":[9],"automated,":[11],"accurate,":[12],"and":[13,65,109,122,131,150,191,201],"highly":[14],"personalized":[15],"customer":[16],"experiences":[17],"across":[18],"various":[19,31],"sectors.":[20],"However,":[21],"personal":[25],"also":[27],"exposes":[28],"individuals":[29],"privacy":[32,98,130,133,157,176,197],"implications.":[33],"This":[34,89],"research":[35,90,183],"project":[36],"aims":[37,91],"investigate":[39],"a":[40,94,112,137,203],"technical":[41],"approach":[42,96,114,126],"achieve":[44],"without":[47],"compromising":[48],"individual":[49],"privacy.":[50],"study":[52],"in":[53],"its":[54],"first":[55],"phase":[56],"focused":[57],"on":[58,75,189],"three":[59],"primary":[60],"algorithms,":[61],"k-anonymization,":[62],"l":[63],"diversity,":[64],"t-closeness,":[66],"which":[67,115,170],"are":[68],"currently":[69],"used":[70],"carry":[72],"out":[73],"anonymizations":[74],"datasets.":[76],"It":[77],"was":[78],"observed":[79],"that":[80],"t-closeness":[81],"had":[82],"least":[84],"value":[85],"re-identification":[87],"risk.":[88],"propose":[93,202],"novel":[95,113,204],"for":[97,140],"preserving":[99,198],"named":[102],"\"DiffT\".":[103],"We":[104],"have":[105],"enhanced":[106],"existing":[107,155,207],"techniques":[108],"then":[110],"proposed":[111,125],"is":[116,171,184],"combination":[117],"both":[119],"Differential":[120],"Privacy":[121,167],"t-closeness.":[123],"DiffT":[127],"offers":[128],"input":[129,156],"output":[132],"control,":[134],"making":[135],"it":[136],"viable":[138],"option":[139],"privacy-conscious":[141],"organizations":[142],"with":[143,154],"less":[144],"demanding":[145],"computational":[146],"needs.":[147],"To":[148],"benchmark":[149],"compare":[151,194],"our":[152],"findings":[153],"method":[158],"Full":[159],"Homomorphic":[160],"Encryption,":[161],"we":[162],"devise":[163],"Epsilon":[164],"(\u2107),":[165],"as":[166],"Loss":[168],"metric,":[169],"assessed":[172],"against":[173],"total":[175],"budget.":[177],"overall":[179],"purpose":[180],"this":[182],"reduce":[186],"over-reliance":[188],"legal":[190],"organizational":[192],"methods,":[193],"present":[196],"techniques,":[200],"intersection":[205],"models.":[208]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
