{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:54:02Z","timestamp":1769925242820,"version":"3.49.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T00:00:00Z","timestamp":1767398400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T00:00:00Z","timestamp":1767398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10207-025-01177-y","type":"journal-article","created":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T08:51:27Z","timestamp":1767430287000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["BuKc: A novel bottom-up approach for enhanced data anonymization in apache spark"],"prefix":"10.1007","volume":"25","author":[{"given":"Salheddine","family":"Kabou","sequence":"first","affiliation":[]},{"given":"Laid","family":"gasmi","sequence":"additional","affiliation":[]},{"given":"Abdelbaset","family":"Kabou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,3]]},"reference":[{"key":"1177_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-018-0149-0","volume":"5","author":"M Al-Zobbi","year":"2018","unstructured":"Al-Zobbi, M., Shahrestani, S., Ruan, C.: Experimenting sensitivity-based anonymization framework in apache spark. Journal of Big Data. 5, 1\u201326 (2018)","journal-title":"Journal of Big Data."},{"key":"1177_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1749603.1749605","volume":"42","author":"BC Fung","year":"2010","unstructured":"Fung, B.C., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv. 42, 1\u201353 (2010)","journal-title":"ACM Comput. Surv."},{"key":"1177_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2020.07.066","volume":"546","author":"F Ashkouti","year":"2021","unstructured":"Ashkouti, F., Khamforoosh, K., Sheikhahmadi, A.: DI-Mondrian-Distributed improved Mondrian for satisfaction of the L-diversity privacy model using Apach Spark. Inf. Sci. 546, 1\u201324 (2021)","journal-title":"Inf. Sci."},{"key":"1177_CR4","doi-asserted-by":"crossref","unstructured":"Ashkouti, F., Khamforoosh, K.: A distributed computing model for big data anonymization in the networks. Plos one. 18. (2023)","DOI":"10.1371\/journal.pone.0285212"},{"key":"1177_CR5","doi-asserted-by":"crossref","unstructured":"Yaseen, S., Abbas, S.M.A., Anjum, A., Saba, T., Khan, A., Malik, S.U.R., ..., Bashir, A.K.: Improved generalization for secure data publishing. IEEE Access. 6. 27156\u201327165 (2018)","DOI":"10.1109\/ACCESS.2018.2828398"},{"key":"1177_CR6","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. 22nd International conference on data engineering (ICDE\u201906). 25-25 (2006)","DOI":"10.1109\/ICDE.2006.101"},{"key":"1177_CR7","doi-asserted-by":"publisher","first-page":"2015","DOI":"10.1007\/s10207-023-00730-x","volume":"22","author":"V Torra","year":"2023","unstructured":"Torra, V., Navarro-Arribas, G.: Attribute disclosure risk for k-anonymity: the case of numerical data. Int. J. Inf. Secur. 22, 2015\u20132024 (2023)","journal-title":"Int. J. Inf. Secur."},{"key":"1177_CR8","doi-asserted-by":"crossref","unstructured":"Su, B., Huang, J., Miao, K., Wang, Z., Zhang, X., Chen, Y.: K-Anonymity Privacy Protection Algorithm for Multi-Dimensional Data against Skewness and Similarity Attacks. Sensors. 23. 1554 (2023)","DOI":"10.3390\/s23031554"},{"key":"1177_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2022.102329","volume":"159","author":"N Jha","year":"2023","unstructured":"Jha, N., Vassio, L., Trevisan, M., Leonardi, E., Mellia, M.: Practical anonymization for data streams: Z-anonymity and relation with k-anonymity. Performance Evaluation. 159, 102329 (2023)","journal-title":"Performance Evaluation."},{"key":"1177_CR10","doi-asserted-by":"crossref","unstructured":"Chen, M., Cang, L.S., Chang, Z., Iqbal, M., Almakhles, D.: Data anonymization evaluation against re-identification attacks in edge storage. Wireless Networks. 1-15 (2023)","DOI":"10.1007\/s11276-023-03235-6"},{"key":"1177_CR11","doi-asserted-by":"publisher","first-page":"8346","DOI":"10.1109\/ACCESS.2024.3352146","volume":"12","author":"JH Lee","year":"2024","unstructured":"Lee, J.H., You, S.J.: Balancing Privacy and Accuracy: Exploring the Impact of Data Anonymization on Deep Learning Models in Computer Vision. IEEE Access. 12, 8346\u20138358 (2024)","journal-title":"IEEE Access."},{"key":"1177_CR12","doi-asserted-by":"crossref","unstructured":"Sopaoglu, U., Abul, O.: A top-down k-anonymization implementation for apache spark. 2017 IEEE international conference on big data (big data). 4513\u20134521 (2017)","DOI":"10.1109\/BigData.2017.8258492"},{"key":"1177_CR13","doi-asserted-by":"crossref","unstructured":"Zakerzadeh, H., Aggarwal, C.C., Barker, K.: Privacy-preserving big data publishing\", Proceedings of the 27th international conference on scientific and statistical database management. 1\u201311 (2015)","DOI":"10.1145\/2791347.2791380"},{"key":"1177_CR14","first-page":"12","volume":"3","author":"K Pandilakshmi","year":"2014","unstructured":"Pandilakshmi, K., Banu, G.R.: An advanced bottom up generalization approach for big data on cloud. Int J Comput Algor. 3, 12\u201315 (2014)","journal-title":"Int J Comput Algor."},{"key":"1177_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2015\/v8i22\/79095","volume":"8","author":"A Irudayasamy","year":"2015","unstructured":"Irudayasamy, A., Arockiam, L.: Parallel bottom-up generalization approach for data anonymization using map reduce for security of data in public cloud. Indian J. Sci. Technol. 8, 1\u20139 (2015)","journal-title":"Indian J. Sci. Technol."},{"key":"1177_CR16","doi-asserted-by":"crossref","unstructured":"Kabou, S., Benslimane, S.M., Mosteghanemi, M.: A survey on privacy preserving dynamic data publishing. Research Anthology on Privatizing and Securing Data.1635-1657 (2021)","DOI":"10.4018\/978-1-7998-8954-0.ch079"},{"issue":"2","key":"1177_CR17","doi-asserted-by":"publisher","first-page":"e6976","DOI":"10.54021\/seesv5n2-125","volume":"5","author":"L Gasmi","year":"2024","unstructured":"Gasmi, L., Kabou, S., Laiche, N., Naichani, R.: Time series forecasting using deep learning hybrid model (ARIMA-LSTM). Studies in Engineering and Exact Sciences 5(2), e6976\u2013e6976 (2024)","journal-title":"Studies in Engineering and Exact Sciences"},{"key":"1177_CR18","doi-asserted-by":"crossref","unstructured":"Kabou, S., Benslimane, S.M.: A new distributed anonymization protocol with minimal loss of information. International Journal of Organizational and Collective Intelligence. 7, 1\u201319 (2017)","DOI":"10.4018\/IJOCI.2017010101"},{"key":"1177_CR19","doi-asserted-by":"crossref","unstructured":"Beckmann, N., Kriegel, H.P., Schneider, R., Seeger, B.: The R*-tree: An efficient and robust access method for points and rectangles. Proceedings of the 1990 ACM SIGMOD international conference on Management of data. 322-331 (1990)","DOI":"10.1145\/93597.98741"},{"key":"1177_CR20","doi-asserted-by":"crossref","unstructured":"Raju, N.L., Seetaramanath, M., Rao, P.S.: An enhanced dynamic kc-slice model for privacy preserving data publishing with multiple sensitive attributes by inducing sensitivity. Journal of King Saud University-Computer and Information Sciences. 34, 1394\u20131406 (2022)","DOI":"10.1016\/j.jksuci.2018.09.013"},{"key":"1177_CR21","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1016\/j.jksuci.2019.08.006","volume":"34","author":"BB Mehta","year":"2022","unstructured":"Mehta, B.B., Rao, U.P.: Improved l-diversity: scalable anonymization approach for privacy preserving big data publishing. Journal of King Saud University-Computer and Information Sciences. 34, 1423\u20131430 (2022)","journal-title":"Journal of King Saud University-Computer and Information Sciences."},{"key":"1177_CR22","doi-asserted-by":"publisher","first-page":"537","DOI":"10.31577\/cai_2020_3_537","volume":"39","author":"P Jain","year":"2020","unstructured":"Jain, P., Gyanchandani, M., Khare, N.: Improved k-anonymize and l-diverse approach for privacy preserving big data publishing using mpsec dataset. Computing and Informatics. 39, 537\u2013567 (2020)","journal-title":"Computing and Informatics."},{"key":"1177_CR23","doi-asserted-by":"crossref","unstructured":"Kabou, S., Benslimane, S.M.: Building virtual anonymized databases for the Cloud. 2015 International Conference on Cloud Technologies and Applications (CloudTech). 1-6 (2015)","DOI":"10.1109\/CloudTech.2015.7336971"},{"key":"1177_CR24","first-page":"189","volume":"5","author":"T Tassa","year":"2012","unstructured":"Tassa, T., Mazza, A., Gionis, A.: k-concealment: An alternative model of k-type anonymity. Transactions on Data Privacy. 5, 189\u2013222 (2012)","journal-title":"Transactions on Data Privacy."},{"issue":"05","key":"1177_CR25","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. Internat. J. Uncertain. Fuzziness Knowledge-Based Systems 10(05), 557\u2013570 (2002)","journal-title":"Internat. J. Uncertain. Fuzziness Knowledge-Based Systems"},{"key":"1177_CR26","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. Acm transactions on knowledge discovery from data (tkdd), 1(1), 3-es. (2007)","DOI":"10.1145\/1217299.1217302"},{"issue":"1","key":"1177_CR27","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/69.979982","volume":"14","author":"J Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer, J., Mateo-Sanz, J.M.: Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans. Knowl. Data Eng. 14(1), 189\u2013201 (2002)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1177_CR28","unstructured":"Ayala-Rivera, V., McDonagh, P., Cerqueus, T., Murphy, L., Thorpe, C.: Enhancing the utility of anonymized data by improving the quality of generalization hierarchies. TRANSACTIONS ON DATA PRIVACY vol(10). 27\u201359. (2017)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01177-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01177-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01177-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T16:07:47Z","timestamp":1769875667000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01177-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,3]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1177"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01177-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,3]]},"assertion":[{"value":"14 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"This article does not contain any studies with human participants and\/or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}}],"article-number":"22"}}