Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
The article presents an approach to data anonymization with the use of generally available tools. The focus is put on the practical aspects of using open‐source tools in conjunction with programming libraries provided by suppliers of industrial control systems. This universal ap‐ proach shows the possibilities of using various operating systems as a platform for process data anonymization. An additional advantage of the described approach is the ease of integration with various types of advanced data analysis tools based both on the out‐of‐the‐box approach (e.g., business intelligence tools) as well as customized solutions. The discussed case describes the anonymiza‐ tion of data for the needs of sensitive analysis by a wider group of recipients during the construction of a predictive model used to support decisions.
Rocznik
Tom
Strony
40--44
Opis fizyczny
Bibliogr. 9 poz., rys.
Twórcy
autor
- Gdańsk University of Technology, Faculty of Electrical and Control Engineering, Poland
autor
- Gdańsk University of Technology, Faculty of Electrical and Control Engineering, Poland
Bibliografia
- [1] Sánchez, D., J. Soria‐Comas, and J. Soria‐Comas. Automatic Anonymization of Textual Documents: Detecting Sensitive Information via Word Embeddings. New Zealand, 2019.
- [2] Nabywaniec, D. Anonymisation and masking of sensitive data in companies. ISBN: 978‐83‐283‐5681‐8 (in Polish), 2019.
- [3] Devaux, E. How “anonymous” is anonymized data? https://medium.com/statice/how‐anonymous‐is‐anonymous‐c92ad265a3e3 (2021‐11‐20).
- [4] Dholakia, J. Building Python apis with ϔlask, ϔlaskrestplus and swagger ui. https://medium.com/analytics‐vidhya/swagger‐ui‐dashboard‐with‐flask‐restplus‐api‐7461b3a9a2c8 (2021‐11‐20).
- [5] Grus J. Data Science from Scratch: First Principles with Python, ISBN: 978‐83‐283‐4603‐1, 2018.
- [6] Murthy, S., A. Abu Bakar, F. Abdul Rahim, and R. Ramli. A Comparative Study of Data Anonymization Techniques. 2019 IEEE 5th International Conference on Big Data Security on Cloud (Big‐DataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), 2019, pp. 306–309, doi: 10.1109/BigDataSecurity‐HPSC‐IDS.2019.00063.
- [7] Samad, A.A.; Arshad, M.M.; Siraj, M.M. Towards Enhancement of Privacy-Preserving Data Mining Model for Predicting Students’ Learning Outcomes Performance. 2021 IEEE International Conference on Computing (ICOCO), 2021, pp. 13–18, doi: 10.1109/ICOCO53166.2021.9673544.
- [8] Kenedy, P. What is werkzeug?. https://testdriven.io/blog/what‐is‐werkzeug/ (2021‐11‐20).
- [9] Grinberg, M. Flask Web Development: Developing Web Applications with Python, 2nd edition, ISBN: 978‐83‐283‐6384‐7, 2020.
Uwagi
Opracowanie rekordu ze środków MEiN, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2024).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-05a5b53c-c14e-4823-b74b-77cc881379ef