{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T10:48:31Z","timestamp":1769942911542,"version":"3.49.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/bigdata.2017.8258492","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:47:28Z","timestamp":1516056448000},"page":"4513-4521","source":"Crossref","is-referenced-by-count":16,"title":["A top-down k-anonymization implementation for apache spark"],"prefix":"10.1109","author":[{"given":"Ugur","family":"Sopaoglu","sequence":"first","affiliation":[]},{"given":"Osman","family":"Abul","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1857947.1857950"},{"key":"ref32","year":"0","journal-title":"UCI Machine Learning Repository"},{"key":"ref31","first-page":"2","article-title":"Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing","author":"zaharia","year":"2012","journal-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation USENIX Association"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920881"},{"key":"ref10","first-page":"8","article-title":"A face is exposed for aol searcher no. 4417749","volume":"9","author":"barbaro","year":"2006","journal-title":"New York Times"},{"key":"ref11","author":"narayanan","year":"2006","journal-title":"How To Break Anonymity of the Netflix Prize Dataset"},{"key":"ref12","author":"bertino","year":"2011","journal-title":"Challenges and Opportunities with Big Data"},{"key":"ref13","author":"baesens","year":"2014","journal-title":"Analytics in a Big Data World The Essential Guide to Data Science and its Applications"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.48"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.235"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CGC.2013.24"},{"key":"ref17","author":"spark","year":"0","journal-title":"Lightning-fast Cluster Computing"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"ref19","article-title":"Mu-argus and tau argus: software for statistical disclosure control","author":"hundpool","year":"1996","journal-title":"Proc Third Int l Seminar Statistical Confidentiality"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.143"},{"key":"ref4","author":"mearian","year":"2011","journal-title":"World's Data Will Grow by 50X in Next Decade IDC Study Predicts"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SSDBM.2007.16"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6863131"},{"key":"ref6","year":"2016","journal-title":"Most famous social network sites worldwide as of september 2016 ranked by number of active users (in millions)"},{"key":"ref29","author":"low","year":"2014","journal-title":"Graphlab A New Framework for Parallel Machine Learning"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2954680.2872397"},{"key":"ref8","author":"wayner","year":"2012","journal-title":"7 top tools for taming big data"},{"key":"ref7","first-page":"228","article-title":"Research issues in big data analytics","volume":"2","author":"kakhani","year":"2013","journal-title":"International Journal of Application or Innovation in Engineering & Management (IJAIEM)"},{"key":"ref2","article-title":"Big data analytics, 2012 internati-onal conference on communication","volume":"4","author":"singh","year":"2012","journal-title":"Information and Computing Technology (ICCICT-2012)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref1","first-page":"1","article-title":"Data-intensive computing with map-reduce and hadoop","author":"hurnbetov","year":"2012","journal-title":"Application of Information and Communication Technologies (AICT) 2012 6th International Conference on"},{"key":"ref20","first-page":"1157","article-title":"Towards the optimal suppression of details when disclosing medical data, the use of sub-combination analysis","author":"sweeney","year":"1998","journal-title":"Studies in Health Technology and Informatics"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.369024"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.101"},{"key":"ref26","first-page":"763","article-title":"The new casper: query processing for location services without compromising privacy","author":"mokbel","year":"2006","journal-title":"Proceedings of the 32nd International Conference on Very Large Data Bases VLDB Endowment"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009839829793"}],"event":{"name":"2017 IEEE International Conference on Big Data (Big Data)","location":"Boston, MA","start":{"date-parts":[[2017,12,11]]},"end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8241556\/8257893\/08258492.pdf?arnumber=8258492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,19]],"date-time":"2018-02-19T23:59:00Z","timestamp":1519084740000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8258492\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2017.8258492","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}