{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T14:40:10Z","timestamp":1747924810671,"version":"3.41.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s13198-025-02766-9","type":"journal-article","created":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T02:24:58Z","timestamp":1744856698000},"page":"1933-1944","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An improved differential privacy-preserving technique for educational dataset"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8409-2966","authenticated-orcid":false,"family":"Nisha","sequence":"first","affiliation":[]},{"given":"Archana","family":"Singhal","sequence":"additional","affiliation":[]},{"given":"Sunil Kumar","family":"Muttoo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,17]]},"reference":[{"key":"2766_CR1","doi-asserted-by":"crossref","unstructured":"Cummings R, et al. (2024) Advancing differential privacy: where we are now and future directions for real-world deployment. Harvard Data Science Review Issue 6.1, Winter 2024","DOI":"10.1162\/99608f92.d3197524"},{"key":"2766_CR2","unstructured":"Desfontaines D (2019) Local vs. central differential privacy. https:\/\/desfontain.es\/privacy\/local-global-differential-privacy.html"},{"key":"2766_CR3","doi-asserted-by":"crossref","unstructured":"Dinur I, Nissim K (2003) Revealing information while preserving privacy. In: Proceedings of the twenty-second ACM SIGACT-SIGMOD-SIGART symposium on principles of database systems, pp 202\u2013210","DOI":"10.1145\/773153.773173"},{"key":"2766_CR4","unstructured":"Dong J, Roth A, Su WJ (2019) Gaussian differential privacy. CoRR, New York, NY, USA, Tech. Rep. 1905.02383"},{"key":"2766_CR5","doi-asserted-by":"publisher","unstructured":"Dwork C, Lei J (2009) Differential privacy and robust statistics. In Proc. 41st Annu. ACM Symp. Symp. theory Comput. (STOC), pp 371\u2013380. https:\/\/doi.org\/10.1145\/1536414.1536466","DOI":"10.1145\/1536414.1536466"},{"key":"2766_CR6","doi-asserted-by":"crossref","unstructured":"Dwork C, McSherry F, Nissim K, Smith A (2006) Calibrating noise to sensitivity in private data analysis. In Proc. 3rd Conf. Theory Cryptogr., Berlin, Germany: Springer, pp 265\u2013284","DOI":"10.1007\/11681878_14"},{"key":"2766_CR7","doi-asserted-by":"crossref","unstructured":"Dwork C, Rothblum GN, Vadhan S (2010) Boosting and differential privacy. In Proc. IEEE 51st Annu. Symp. Found. Comput. Sci., pp 51\u201360","DOI":"10.1109\/FOCS.2010.12"},{"issue":"3\u20134","key":"2766_CR8","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork C, Roth A (2014) The algorithmic foundations of differential privacy. Found Trends Theor Comput Sci 9(3\u20134):211\u2013405 (ISSN -1551-305X)","journal-title":"Found Trends Theor Comput Sci"},{"key":"2766_CR9","unstructured":"Dwork C (2006) Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol 4052, pp 1\u201312. Springer, Heidelberg"},{"issue":"6","key":"2766_CR10","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1137\/09076828X","volume":"41","author":"A Ghosh","year":"2012","unstructured":"Ghosh A, Roughgarden T, Sundararajan M (2012) Universally utility-maximizing privacy mechanisms. SIAM J Comput 41(6):1673\u20131693. https:\/\/doi.org\/10.1137\/09076828X","journal-title":"SIAM J Comput"},{"key":"2766_CR11","doi-asserted-by":"crossref","unstructured":"Gursoy EM, Inan A, Nergiz ME, Saygin Y (2017) Privacy-preserving learning analytics: challenges and techniques. IEEE Transactions on Learning Technologies, Vol. 10, No. 1, IEEE","DOI":"10.1109\/TLT.2016.2607747"},{"key":"2766_CR12","doi-asserted-by":"crossref","unstructured":"Huang W, Zhou S, Zhu T, Liao Y, Wu C, Qiu S (2020) Improving laplace mechanism of differential privacy by personalized sampling. IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","DOI":"10.1109\/TrustCom50675.2020.00088"},{"key":"2766_CR13","doi-asserted-by":"crossref","unstructured":"HuID Z, Yang J (2020). Differential privacy protection method based on published trajectory cross-correlation constraint. PLoS One, pp 1\u201325","DOI":"10.1371\/journal.pone.0237158"},{"key":"2766_CR14","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1038\/s42256-020-0186-1","volume":"2","author":"GA Kaissis","year":"2020","unstructured":"Kaissis GA, Makowski MR, R\u00fcckert D, Braren RF (2020) Secure, privacy-preserving and federated machine learning in medical imaging. Nat Mach Intell 2:305\u2013311","journal-title":"Nat Mach Intell"},{"key":"2766_CR15","doi-asserted-by":"crossref","unstructured":"Lee J, Clifton C (2011) How much is enough? Choosing \u03f5 for differential privacy. International Conference on Information Security: ISC 2011, LNCS 7001, pp 325\u2013340. Springer-Verlag Berlin Heidelberg","DOI":"10.1007\/978-3-642-24861-0_22"},{"key":"2766_CR16","doi-asserted-by":"publisher","unstructured":"Li N, Li T, Venkatasubramanian S (2007) t-Closeness: privacy beyond k-anonymity and l-diversity. IEEE 23rd International Conference on Data Engineering, Istanbul, Turkey, 2007, pp 106\u2013115. https:\/\/doi.org\/10.1109\/ICDE.2007.367856","DOI":"10.1109\/ICDE.2007.367856"},{"key":"2766_CR17","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1007\/s40745-023-00475-3","volume":"11","author":"W Liu","year":"2024","unstructured":"Liu W, Zhang Y, Yang H, Meng Q (2024) A survey on differential privacy for medical data analysis. Annals Data Sci 11:733\u2013747","journal-title":"Annals Data Sci"},{"key":"2766_CR18","doi-asserted-by":"publisher","unstructured":"Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M (2006) L-diversity: privacy beyond k-anonymity. 22nd International Conference on Data Engineering (ICDE'06), Atlanta, GA, USA, pp 24\u201324, https:\/\/doi.org\/10.1109\/ICDE.2006.1","DOI":"10.1109\/ICDE.2006.1"},{"key":"2766_CR19","doi-asserted-by":"crossref","unstructured":"McSherry F (2009) Privacy integrated queries, an extensible platform for privacy-preserving data analysis. SIGMOD\u201909, Providence, Rhode Island, USA","DOI":"10.1145\/1559845.1559850"},{"key":"2766_CR20","first-page":"3307","volume":"15","author":"SK Muttoo","year":"2023","unstructured":"Muttoo SK, Nisha, Singhal A (2023) A novel privacy-preserving technique using steganography and L-diversity for multi-relational educational dataset. Int J Inf Technol 15:3307\u20133325","journal-title":"Int J Inf Technol"},{"key":"2766_CR21","doi-asserted-by":"crossref","unstructured":"Nisha, Singhal A, Muttoo SK (2020) Learning analytics: a literature review and its challenges. Proceedings of the 5th International conference on Information and Communication Technology for Competitive Strategies (ICTCS), Vol 190, pp 607\u2013617. Springers (Scopus Indexed)","DOI":"10.1007\/978-981-16-0882-7_53"},{"key":"2766_CR22","doi-asserted-by":"crossref","unstructured":"Nisha, Singhal A, Muttoo SK (2021) Anonymization of multi-relational dataset using single table methods. Proceedings of the 6th International Conference on Information and Communication Technology for Competitive Strategies (ICTCS), Vol 401, pp 21\u201330. Springers (Scopus Indexed)","DOI":"10.1007\/978-981-19-0098-3_3"},{"key":"2766_CR23","doi-asserted-by":"crossref","unstructured":"Nisha, Singhal A, Muttoo SK (2022) A literature review of differential privacy and its challenges. 7th International Conference on Information and Communication Technology for Competitive Strategies (ICTCS), Vol 615, pp 713\u2013722. Springers (Scopus Indexed)","DOI":"10.1007\/978-981-19-9304-6_64"},{"key":"2766_CR24","doi-asserted-by":"crossref","unstructured":"Nissim K, Raskhodnikova S, Smith A (2007) Smooth sensitivity and sampling in private data analysis. In: Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing, pp 75\u201384. ACM, New York","DOI":"10.1145\/1250790.1250803"},{"key":"2766_CR25","doi-asserted-by":"crossref","unstructured":"Ouadrhiri AE, Abdelhadi A (2022) Differential privacy for deep and federated learning: a survey. IEEE Access. pp 22359\u201322380","DOI":"10.1109\/ACCESS.2022.3151670"},{"issue":"2","key":"2766_CR26","first-page":"103677","volume":"80","author":"M Rahman","year":"2024","unstructured":"Rahman M, Murmur A, Kumar P et al (2024) A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems. J Inf Secur Appl 80(2):103677","journal-title":"J Inf Secur Appl"},{"key":"2766_CR27","unstructured":"Roy I, Setty S, Kilzer A, Shmatikov V, Witchel E (2010) Airavat: security and privacy for MapReduce. In: Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, pp. 20. USENIX Association"},{"key":"2766_CR28","unstructured":"Zheng Q, Chen S, Long Q, Su WJ (2021) Federated f-differential privacy. Proceedings of the 24th International Conference on Artificial Intelligence and Statistics (AISTATS), San Diego, California, USA. PMLR: Vol 130"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-02766-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-025-02766-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-02766-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T14:06:15Z","timestamp":1747922775000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-025-02766-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,17]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["2766"],"URL":"https:\/\/doi.org\/10.1007\/s13198-025-02766-9","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"type":"print","value":"0975-6809"},{"type":"electronic","value":"0976-4348"}],"subject":[],"published":{"date-parts":[[2025,4,17]]},"assertion":[{"value":"28 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Author Ms. Nisha declares that she has no conflict of interest. Author Prof. Archana Singhal declares that she has no conflict of interest. Author Prof. Sunil Kumar Muttoo declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human or animal participants"}}]}}