{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T06:41:57Z","timestamp":1777099317499,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T00:00:00Z","timestamp":1716940800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,29]]},"DOI":"10.1145\/3686540.3686542","type":"proceedings-article","created":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T12:23:04Z","timestamp":1730982184000},"page":"8-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Academic Data Privacy-Preserving using Centralized and Distributed Systems: A Comparative Study"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2182-5258","authenticated-orcid":false,"given":"Hanane","family":"Lamaazi","sequence":"first","affiliation":[{"name":"College of Information Technology, United Arab Emirates University, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4401-6752","authenticated-orcid":false,"given":"Aysha Muaded Moha","family":"Alneyadi","sequence":"additional","affiliation":[{"name":"College of Information Technology, United Arab Emirates University, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7001-3710","authenticated-orcid":false,"given":"Mohamed Adel","family":"Serhani","sequence":"additional","affiliation":[{"name":"College of Computing and Informatics, Sharjah University, UAE"}]}],"member":"320","published-online":{"date-parts":[[2024,9,19]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119166900.ch38"},{"key":"e_1_3_2_2_2_1","volume-title":"Your gateway to world-class research journals. SAGE Journals, journals. sagepub. com\/doi\/abs\/10.1177\/0002764297040005007. (Accessed","author":"Minkoff C","year":"2015","unstructured":"C Minkoff. Your gateway to world-class research journals. SAGE Journals, journals. sagepub. com\/doi\/abs\/10.1177\/0002764297040005007. (Accessed July 15, 2015)."},{"key":"e_1_3_2_2_3_1","volume-title":"Student data: Trust, transparency, and the role of consent. Transparency, and the Role of Consent (October 1","author":"Polonetsky Jules","year":"2014","unstructured":"Jules Polonetsky and Joseph Jerome. Student data: Trust, transparency, and the role of consent. Transparency, and the Role of Consent (October 1, 2014), 2014."},{"key":"e_1_3_2_2_4_1","first-page":"339","article-title":"Student privacy principles for the age of big data: Moving beyond ferpa and fipps","volume":"8","author":"Zeide Elana","year":"2015","unstructured":"Elana Zeide. Student privacy principles for the age of big data: Moving beyond ferpa and fipps. Drexel L. Rev., 8:339, 2015.","journal-title":"Drexel L. Rev."},{"key":"e_1_3_2_2_5_1","first-page":"678","volume-title":"Smart Digital Futures","author":"Weber Alan S","year":"2014","unstructured":"Alan S Weber. Suggested legal framework for student data privacy in the age of big data and smart devices. In Smart Digital Futures 2014, pages 669\u2013678. IOS Press, 2014."},{"key":"e_1_3_2_2_6_1","volume-title":"Integrating machine learning and blockchain to develop a system to veto the forgeries and provide efficient results in the education sector. Visual Computing for Industry, Biomedicine, and Art, 4:1\u201313","author":"Shah Dhruvil","year":"2021","unstructured":"Dhruvil Shah, Devarsh Patel, Jainish Adesara, Pruthvi Hingu, and Manan Shah. Integrating machine learning and blockchain to develop a system to veto the forgeries and provide efficient results in the education sector. Visual Computing for Industry, Biomedicine, and Art, 4:1\u201313, 2021."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Daniel Amo Filva\u00b4 Paul Prinsloo Marc Alier Forment David Fon- seca Escudero Ricardo Torres Kompen Xavier Canaleta Llampallas and Javier Herrero Mart\u00b4\u0131n. Local technology to enhance data privacy and security in educational technology. International Journal of interactive multimedia and artificial intelligence 7(2):262\u2013273 2021.","DOI":"10.9781\/ijimai.2021.11.006"},{"key":"e_1_3_2_2_8_1","volume-title":"6 core tips for data security in educational institutions","author":"Korotaev M.","year":"2023","unstructured":"M. Korotaev. 6 core tips for data security in educational institutions, 2023."},{"key":"e_1_3_2_2_9_1","volume-title":"Strong encryption explained: 6 encryption best practices","author":"Kime C","year":"2024","unstructured":"C Kime. Strong encryption explained: 6 encryption best practices, 2024."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23031554"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2870614.2870620"},{"key":"e_1_3_2_2_12_1","first-page":"3","volume-title":"2019 SoutheastCon","author":"Almohaimeed Abdulrahman","unstructured":"Abdulrahman Almohaimeed and Srikanth Gampa. Applying k-nearest neighbors to increase the utility of k-anonymity. In 2019 SoutheastCon, pages 1\u20133. IEEE, 2019."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3038249"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10186-1"},{"key":"e_1_3_2_2_15_1","volume-title":"Trustfed: A reliable federated learning framework with malicious-attack resistance. arXiv preprint arXiv:2312.04597","author":"Su Hangn","year":"2023","unstructured":"Hangn Su, Jianhong Zhou, Xianhua Niu, and Gang Feng. Trustfed: A reliable federated learning framework with malicious-attack resistance. arXiv preprint arXiv:2312.04597, 2023."},{"key":"e_1_3_2_2_16_1","first-page":"189","volume-title":"Cyber Security for Next-Generation Computing Technologies","author":"Lamaazi Hanane","unstructured":"Hanane Lamaazi. Cyber security for edge\/fog computing applications. In Cyber Security for Next-Generation Computing Technologies, pages 177\u2013189. CRC Press, 2024."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3371488"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.01.014"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.12720\/jait.6.3.88-95"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119166900.ch38"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3501191"},{"key":"e_1_3_2_2_22_1","first-page":"161","volume-title":"2020 Sixth International Conference on e-Learning (econf)","author":"Alamleh Hosam","unstructured":"Hosam Alamleh. Private and secure students\u2019 data sharing in educational systems. In 2020 Sixth International Conference on e-Learning (econf), pages 158\u2013161. IEEE, 2020."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1186\/s41039-018-0086-8"},{"key":"e_1_3_2_2_24_1","volume-title":"Students","author":"IBRAHIM","year":"2016","unstructured":"IBRAHIM ALJARAH. Students\u2019 academic performance dataset (xapi- edu-data), 2016."},{"key":"e_1_3_2_2_25_1","first-page":"5","volume-title":"2015 IEEE Jordan conference on Applied Electrical Engineering and Computing Technologies (AEECT)","author":"Amrieh Elaf Abu","unstructured":"Elaf Abu Amrieh, Thair Hamtini, and Ibrahim Aljarah. Preprocessing and analyzing educational data sets using x-api for improving student performance. In 2015 IEEE Jordan conference on Applied Electrical Engineering and Computing Technologies (AEECT), pages 1\u20135. IEEE, 2015."},{"key":"e_1_3_2_2_26_1","unstructured":"ARX. Privacy models) 2024."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-022-01894-2"}],"event":{"name":"BDSIC 2024: 2024 6th International Conference on Big-data Service and Intelligent Computation","location":"Hong Kong Hong Kong","acronym":"BDSIC 2024"},"container-title":["Proceedings of the 2024 6th International Conference on Big-data Service and Intelligent Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686540.3686542","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3686540.3686542","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:21:57Z","timestamp":1755973317000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686540.3686542"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,29]]},"references-count":27,"alternative-id":["10.1145\/3686540.3686542","10.1145\/3686540"],"URL":"https:\/\/doi.org\/10.1145\/3686540.3686542","relation":{},"subject":[],"published":{"date-parts":[[2024,5,29]]},"assertion":[{"value":"2024-09-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}