{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:05:06Z","timestamp":1773615906927,"version":"3.50.1"},"reference-count":36,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625701020","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:30:31Z","timestamp":1771936231000},"page":"1464-1474","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimization of Data Obfuscation in Big Data Processing and Storage Systems"],"prefix":"10.3103","volume":"59","author":[{"given":"M. A.","family":"Poltavtseva","sequence":"first","affiliation":[]},{"given":"O. A.","family":"Izotova","sequence":"additional","affiliation":[]},{"given":"D. V.","family":"Ivanov","sequence":"additional","affiliation":[]},{"given":"D. P.","family":"Zegzhda","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7937_CR1","unstructured":"Current cyber threats: Q1 2024. https:\/\/www.ptsecurity.com\/ru-ru\/research\/analytics\/cybersecurity-threatscape-2024-q1\/. Cited May 22, 2025."},{"key":"7937_CR2","unstructured":"Poltavtseva, M.A., Platonov, V.V., and Semyanov, P.V., Secure data processing architectures in big data systems, Akademicheskaya nauka \u2014 problemy i dostizheniya (Academic Science\u2014Challenges and Achievements), Bengaluru, India: Pothi.com, 2024, pp. 104\u2013108."},{"key":"7937_CR3","unstructured":"Spevakov, A.G., Kalutskii, I.V., Nikulin, D.A., and Shumailova, V.A., Depersonalization of personal data during processing of information in automated systems, Telekommunikatsii, 2016, no. 10, pp. 16\u201320."},{"key":"7937_CR4","doi-asserted-by":"publisher","first-page":"790","DOI":"10.3103\/s014641161508009x","volume":"49","author":"A.N. Kulakov","year":"2015","unstructured":"Kulakov, A.N. and Aleksandrova, E.B., Analysis of broadcast schemes that implement identity-based encryption algorithms, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 790\u2013797. https:\/\/doi.org\/10.3103\/s014641161508009x","journal-title":"Autom. Control Comput. Sci."},{"key":"7937_CR5","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1016\/j.ijinfomgt.2016.08.002","volume":"36","author":"J. Henriksen-Bulmer","year":"2016","unstructured":"Henriksen-Bulmer, J. and Jeary, Sh., Re-identification attacks\u2014A systematic literature review, Int. J. Inf. Manage., 2016, vol. 36, no. 6, pp. 1184\u20131192. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2016.08.002","journal-title":"Int. J. Inf. Manage."},{"key":"7937_CR6","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1093\/jamia\/ocw167","volume":"24","author":"J.L. Raisaro","year":"2017","unstructured":"Raisaro, J.L., Tram\u00e8r, F., Ji, Zh., Bu, D., Zhao, Yo., Carey, K., Lloyd, D., Sofia, H., Baker, D., Flicek, P., Shringarpure, S., Bustamante, C., Wang, Sh., Jiang, X., Ohno-Machado, L., Tang, H., Wang, X., and Hubaux, J.-P., Addressing Beacon re-identification attacks: Quantification and mitigation of privacy risks, J. Am. Med. Inf. Assoc., 2017, vol. 24, no. 4, pp. 799\u2013805. https:\/\/doi.org\/10.1093\/jamia\/ocw167","journal-title":"J. Am. Med. Inf. Assoc."},{"key":"7937_CR7","unstructured":"Requirements and methods for depersonalization of personal data processed in personal data information systems, including those created and functioning within the framework of the implementation of federal target programs (approved by the Order of the Federal Service for Supervision in the Sphere of Communications, Information Technology and Mass Communications dated September 5, 2013 N 996). https:\/\/base.garant.ru\/70451476\/. Cited May 22, 2025."},{"key":"7937_CR8","unstructured":"Draft order On approval of requirements for personal data depersonalization and methods of personal data depersonalization, except for cases specified in paragraph 9, part 1, Article 6 of the Federal Law on Personal Data. https:\/\/regulation.gov.ru\/p\/155867\/. Cited May 22, 2025."},{"key":"7937_CR9","doi-asserted-by":"publisher","unstructured":"Gadotti, A., Rocher, L., Houssiau, F., Cre\u0163u, A.-M., and de Montjoye, Y.-A., Anonymization: The imperfect science of using data while preserving privacy, Sci. Adv., 2024, vol. 10, no. 29, p. eadn7053. https:\/\/doi.org\/10.1126\/sciadv.adn7053","DOI":"10.1126\/sciadv.adn7053"},{"key":"7937_CR10","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s40745-024-00557-w","volume":"12","author":"E. Shamsinejad","year":"2025","unstructured":"Shamsinejad, E., Banirostam, T., Pedram, M.M., and Rahmani, A.M., A review of anonymization algorithms and methods in big data, Annals of Data Science, 2025, vol. 12, no. 1, pp. 253\u2013279. https:\/\/doi.org\/10.1007\/s40745-024-00557-w","journal-title":"Annals of Data Science"},{"key":"7937_CR11","doi-asserted-by":"publisher","unstructured":"Suntherasvaran, M., Bakar, A.A., and Ramli, R., A comparative study of data anonymization techniques, IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), Washington, DC, 2019, IEEE, 2019, pp. 306\u2013309. https:\/\/doi.org\/10.1109\/BigDataSecurity-HPSC-IDS.2019.00063","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00063"},{"key":"7937_CR12","doi-asserted-by":"publisher","first-page":"5263","DOI":"10.1007\/s11276-023-03235-6","volume":"30","author":"M. Chen","year":"2024","unstructured":"Chen, M., Cang, L.Sh., Chang, Zh., Iqbal, M., and Almakhles, D., Data anonymization evaluation against re-identification attacks in edge storage, Wireless Networks, 2024, vol. 30, no. 6, pp. 5263\u20135277. https:\/\/doi.org\/10.1007\/s11276-023-03235-6","journal-title":"Wireless Networks"},{"key":"7937_CR13","doi-asserted-by":"publisher","first-page":"848","DOI":"10.3103\/s0146411617080284","volume":"51","author":"D.P. Zegzhda","year":"2017","unstructured":"Zegzhda, D.P., Usov, E.S., Nikol\u2019skii, A.V., and Pavlenko, E.Yu., Use of Intel SGX to ensure the confidentiality of data of cloud users, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 848\u2013854. https:\/\/doi.org\/10.3103\/s0146411617080284","journal-title":"Autom. Control Comput. Sci."},{"key":"7937_CR14","doi-asserted-by":"publisher","unstructured":"Fienberg, S.E. and Slavkovi\u0107, A.B., Data privacy and confidentiality, International Encyclopedia of Statistical Science, Lovric, M., Ed., Berlin: Springer, 2025, pp. 615\u2013619. https:\/\/doi.org\/10.1007\/978-3-662-69359-9_154","DOI":"10.1007\/978-3-662-69359-9_154"},{"key":"7937_CR15","doi-asserted-by":"publisher","unstructured":"Sharda, S. et al., Data anonymization and encryption in cloud environments: Legal implications and best practices, Embracing the Cloud as a Business Essential, Rai, P.K., Ahmad, T., and Pandey, B.K., Eds., IGI Global, 2025, pp. 125\u2013144. https:\/\/doi.org\/10.4018\/979-8-3693-9581-3.ch007","DOI":"10.4018\/979-8-3693-9581-3.ch007"},{"key":"7937_CR16","doi-asserted-by":"publisher","unstructured":"Koyuncu, H. and Altaher, R., Classification of data anonymization techniques, Artificial Intelligence for Cyber Security and Industry 4.0, Boca Raton, FL: CRC Press, 2025, pp. 57\u201396. https:\/\/doi.org\/10.1201\/9781032657264-3","DOI":"10.1201\/9781032657264-3"},{"key":"7937_CR17","unstructured":"Veb-programmirovanie i internet-tekhnologii (WebConf2024). Materialy 6-i Mezhdunarodnoi nauchno-prakticheskoi konferentsii (Web Programming and Internet Technologies (WebConf2024): Proceedings of the 6th International Scientific and Practical Conference), Minsk, 2024, Galkin, I.M. et al., Eds., Minsk: Belorusskii Gosudarstvennyi Universitet, 2024, pp. 341\u2013345."},{"key":"7937_CR18","doi-asserted-by":"publisher","first-page":"4650","DOI":"10.3390\/electronics13234650","volume":"13","author":"Sh.I. Ahsan","year":"2024","unstructured":"Ahsan, Sh.I., Djenouri, D., and Haider, R., Privacy-enhanced sentiment analysis in mental health: Federated learning with data obfuscation and bidirectional encoder representations from transformers, Electronics, 2024, vol. 13, no. 23, p. 4650. https:\/\/doi.org\/10.3390\/electronics13234650","journal-title":"Electronics"},{"key":"7937_CR19","doi-asserted-by":"publisher","unstructured":"Prodomo, V., Gonzalez, R., Gramaglia, M., and Romano, S.P., Privacy-preserving data obfuscation for credit scoring, Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing, Catania, 2025, New York: Association for Computing Machinery, 2025, pp. 114\u2013121. https:\/\/doi.org\/10.1145\/3672608.3707864","DOI":"10.1145\/3672608.3707864"},{"key":"7937_CR20","doi-asserted-by":"publisher","unstructured":"Sargiotis, D., Data security and privacy: Protecting sensitive information, Data Governance, Cham: Springer, 2024, pp. 217\u2013245. https:\/\/doi.org\/10.1007\/978-3-031-67268-2_6","DOI":"10.1007\/978-3-031-67268-2_6"},{"key":"7937_CR21","doi-asserted-by":"publisher","unstructured":"Zhang, X., Chen, Zh., Chen, G., Feng, X., Shen, Q., and Wu, Zh., RPPFL: Robust and privacy-preserving federated learning via trusted execution environments, ICASSP 2025\u20142025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Hyderabad, India, 2025, IEEE, 2025, pp. 1\u20135. https:\/\/doi.org\/10.1109\/icassp49660.2025.10889398","DOI":"10.1109\/icassp49660.2025.10889398"},{"key":"7937_CR22","doi-asserted-by":"publisher","first-page":"1261","DOI":"10.3390\/app15031261","volume":"15","author":"H. Cheng","year":"2025","unstructured":"Cheng, H., Qiang, Ch., Cong, L., Xiao, J., Liu, Sh., Zhou, X., Wang, H., Ruan, M., and Lv, Ch., A novel data obfuscation framework integrating probability density and information entropy for privacy preservation, Appl. Sci., 2025, vol. 15, no. 3, p. 1261. https:\/\/doi.org\/10.3390\/app15031261","journal-title":"Appl. Sci."},{"key":"7937_CR23","first-page":"172","volume":"17","author":"K. Rejendran","year":"2017","unstructured":"Rejendran, K., Jayabalan, M., and Rana, M.E., A study on k-anonymity, l-diversity, and t-closeness techniques focusing medical data, International Journal of Computer Science and Network Security, 2017, vol. 17, no. 12, pp.\u00a0172\u2013177.","journal-title":"International Journal of Computer Science and Network Security"},{"key":"7937_CR24","doi-asserted-by":"publisher","unstructured":"Byun, J.-W., Kamra, A., Bertino, E., and Li, N., Efficient k-anonymization using clustering techniques, Advances in Databases: Concepts, Systems and Applications. DASFAA 2007, Kotagiri, R., Krishna, P.R., Mohania, M., and Nantajeewarawat, E., Eds., Lecture Notes in Computer Science, vol. 4443, Berlin: Springer, 2007, pp. 188\u2013200. https:\/\/doi.org\/10.1007\/978-3-540-71703-4_18","DOI":"10.1007\/978-3-540-71703-4_18"},{"key":"7937_CR25","doi-asserted-by":"publisher","first-page":"713","DOI":"10.3103\/s0146411615080167","volume":"49","author":"N.S. Vert","year":"2015","unstructured":"Vert, N.S., Volkova, A.S., Zegzhda, D.P., and Kalinin, M.O., Maintenance of sustainable operation of pipeline-parallel computing systems in the cloud environment, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp.\u00a0713\u2013720. https:\/\/doi.org\/10.3103\/s0146411615080167","journal-title":"Autom. Control Comput. Sci."},{"key":"7937_CR26","doi-asserted-by":"publisher","unstructured":"Huda, Md.N., Yamada, Sh., and Sonehara, N., An efficient k-anonymization algorithm with low information loss, Recent Progress in Data Engineering and Internet Technology, Gaol, F., Ed., Lecture Notes in Electrical Engineering, vol. 156, Springer, 2013, pp. 249\u2013254. https:\/\/doi.org\/10.1007\/978-3-642-28807-4_35","DOI":"10.1007\/978-3-642-28807-4_35"},{"key":"7937_CR27","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10115-010-0311-2","volume":"28","author":"B. Zhou","year":"2010","unstructured":"Zhou, B. and Pei, J., The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks, Knowl. Inf. Syst., 2010, vol. 28, no. 1, pp. 47\u201377. https:\/\/doi.org\/10.1007\/s10115-010-0311-2","journal-title":"Knowl. Inf. Syst."},{"key":"7937_CR28","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A. Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., and Venkitasubramaniam, M., L-diversity: Privacy beyond k-anonymity, ACM Trans. Knowl. Discovery Data, 2007, vol. 1, no. 1, pp. 3\u201320. https:\/\/doi.org\/10.1145\/1217299.1217302","journal-title":"ACM Trans. Knowl. Discovery Data"},{"key":"7937_CR29","unstructured":"Xiao, X. and Tao, Y., Anatomy: Simple and effective privacy preservation, Proceedings of the 32nd International Conference on Very Large Data Bases, 2006, pp. 139\u2013150."},{"key":"7937_CR30","doi-asserted-by":"publisher","unstructured":"Li, N., Li, T., and Venkatasubramanian, S., t-closeness: Privacy beyond k-anonymity and l-diversity, 2007 IEEE 23rd International Conference on Data Engineering, Istanbul, 2006, IEEE, 2006, pp. 106\u2013115. https:\/\/doi.org\/10.1109\/icde.2007.367856","DOI":"10.1109\/icde.2007.367856"},{"key":"7937_CR31","doi-asserted-by":"publisher","unstructured":"Gowda, V.T., Bagai, R., Spilinek, G., and Vitalapura, S., Efficient near-optimal t-closeness with low information loss, 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Cracow, Poland, 2021, IEEE, 2021, pp. 494\u2013498. https:\/\/doi.org\/10.1109\/idaacs53288.2021.9661004","DOI":"10.1109\/idaacs53288.2021.9661004"},{"key":"7937_CR32","doi-asserted-by":"publisher","unstructured":"Dwork, C., Differential privacy, Automata, Languages and Programming. ICALP 2006, Bugliesi, M., Preneel, B., Sassone, V., and Wegener, I., Eds., Lecture Notes in Computer Science, vol. 4052, Berlin: Springer, 2006, pp.\u00a01\u201312. https:\/\/doi.org\/10.1007\/11787006_1","DOI":"10.1007\/11787006_1"},{"key":"7937_CR33","doi-asserted-by":"publisher","first-page":"5359","DOI":"10.1109\/tifs.2023.3306159","volume":"18","author":"G. Muthukrishnan","year":"2023","unstructured":"Muthukrishnan, G. and Kalyani, Sh., Grafting Laplace and Gaussian distributions: A new noise mechanism for differential privacy, IEEE Trans. Inf. Forensics Secur., 2023, vol. 18, pp. 5359\u20135374. https:\/\/doi.org\/10.1109\/tifs.2023.3306159","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7937_CR34","doi-asserted-by":"publisher","first-page":"7030","DOI":"10.3390\/s20247030","volume":"20","author":"T. Wang","year":"2020","unstructured":"Wang, T., Zhang, X., Feng, J., and Yang, X., A comprehensive survey on local differential privacy toward data statistics and analysis, Sensors, 2020, vol. 20, no. 24, p. 7030. https:\/\/doi.org\/10.3390\/s20247030","journal-title":"Sensors"},{"key":"7937_CR35","doi-asserted-by":"publisher","unstructured":"Elsen, R. and Audytra, H., Operational-based obfuscation for securing data definition and manipulation in database query execution for smart data management, 2024 International Conference on ICT for Smart Society (ICISS), Bandung, Indonesia, 2024, IEEE, 2024, pp. 1\u20134. https:\/\/doi.org\/10.1109\/iciss62896.2024.10751162","DOI":"10.1109\/iciss62896.2024.10751162"},{"key":"7937_CR36","doi-asserted-by":"publisher","unstructured":"Tang, P., Dong, Yu., Qiu, W., and Huang, Zh., Bidirectional anonymous private set intersection based on obfuscation, 2024 IEEE Smart World Congress (SWC), Nadi, Fiji, 2024, IEEE, 2024, pp. 919\u2013927. https:\/\/doi.org\/10.1109\/swc62898.2024.00152","DOI":"10.1109\/swc62898.2024.00152"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625701020.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625701020","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625701020.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:06:51Z","timestamp":1773612411000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625701020"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":36,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7937"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625701020","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"10 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}