look at applying a perturbative method to anonymiz-
ing the data in this case (Aggarwal and Philip, 2008).
In our experiment, the choice of the threshold for the
probability of having enough requests within a spec-
ified time frame is set to an extrema of the presented
benchmark (Zakerzadeh and Osborn, 2013). For fu-
ture work, further benchmark could be considered in
order to determine if a lower threshold performs bet-
ter. In the future we will also make some inclusion for
plans to work on real datasets. We can achieve this by
carrying out some usability study to collect real data
with the CRY-HELP App.
REFERENCES
Aggarwal, C. and Philip, S. (2008). A general survey
of privacy-preserving data mining models and algo-
rithms.
Bayardo, R. J. and Agrawal, R. (2002). Data privacy
through optimal k-anonymization. In Data Engineer-
ing, 2005. ICDE 2005. Proceedings. 21st Interna-
tional Conference on (pp. 217-228).
Cao, J., Carminati, B., Ferrari, E., and Tan, K. L. (2008).
Castle: Continuously Anonymizing Data Streams.
Dependable and Secure Computing, IEEE Transac-
tions on, 8(3), 337-352.
CryHelp-App (2014). http://people.cs.uct.ac.za/ tndlovu
/(accessed, may 2014).
Dwork, C. (2006). Differential privacy. In Automata, lan-
guages and programming (pp. 1-12).
Guo, K. and Zhang, Q. (2013). Fast clustering-based
anonymization approaches with time constraints for
data streams. Knowledge-Based Systems, Elsevier.
Iyengar, V. S. (2002). Transforming data to satisfy pri-
vacy constraints. In Proceedings of the eighth ACM
SIGKDD international conference on Knowledge dis-
covery and data mining (pp. 279-288).
Jensen, K. L., Iipito, H. N., Onwordi, M. U., and
Mukumbira, S. (2012). Toward an mpolicing solu-
tion for namibia: leveraging emerging mobile plat-
forms and crime mapping. In Proceedings of the South
African Institute for Computer Scientists and Informa-
tion Technologists Conference (pp. 196-205).
Kayem, A. V. D. M., Martin, P., and Akl, S. G. (2011). Ef-
fective cryptographic key management for outsourced
dynamic data sharing environments. In Proc. of the
10th Annual Information Security Conference (ISSA
2011), Johannesburg, South Africa, pp.1-8.
Li, J., Ooi, B. C., and Wang, W. (2008). Anonymizing
streaming data for privacy protection. In Data En-
gineering, 2008. ICDE 2008. IEEE 24th International
Conference on (pp. 1367-1369).
Li, S. (2006). Poisson process with fuzzy rates. In Fuzzy
Optimization and Decision Making, 9(3), pp. 289-305.
Mark-John, B. and Kayem, A. V. D. M. (2014). K-
anonymity for privacy preserving crime data publish-
ing in resource constrained environments. In the
8th International Symposium on Security and Multi-
nodality in Pervasive Environments, (SMPE 2014),
Victoria, Canada - May 13-16, 2014.
Patroumpas, K. and Sellis, T. (2006). Window specifica-
tion over data streams. In Current Trends in Database
TechnologyEDBT 2006 (pp. 445-464).
Qiu, L., Li, Y., and Wu, X. (2008). Protecting business intel-
ligence and customer privacy while outsourcing data
mining tasks. In TEMPLATE’06, 1st International
Conference on Template Production. Knowledge and
information systems, 17(1), pp. 99-120.
Sakpere, A. B. and Kayem, A. V. D. M. (2014). A state of
the art review of data stream anonymisation schemes.
Information Security in Diverse Computing Enviro-
ments, 24. IGI Global, PA, USA., USA.
Sweeney, L. (2002). k-anonymity: A model for protecting
privacy. International Journal of Uncertainty, Fuzzi-
ness and Knowledge-Based Systems, 10 (05), 557-
570.
Vimercati, S. D. C. D., Foresti, S., Jajodia, S., Paraboschi,
S., and Samarati, P. (2010). Encryption policies for
regulating access to outsourced data. ACM Trans.
Database Syst., 35(2), pp. 12:1-12:46.
Wang, P., Lu, J., Zhao, L., and Yang, J. (2010). B-castle: an
efficient publishing algorithm for k-anonymizing data
streams. Proceedings of the 2010 Second WRI Global
Congress on Intelligent Systems, Wuhan, China, 2010,
pp. 132136.
Zakerzadeh, H. and Osborn, S. L. . (2011). Faanst: Fast
anonymizing algorithm for numerical streaming data.
In Data Privacy Management and Autonomous Spon-
taneous Security (pp. 36-50).
Zakerzadeh, H. and Osborn, S. L. (2013). Delay-sensitive
approaches for anonymizing numerical streaming
data. International Journal of Information Security,
1-15.
Zhang, J., Yang, J., Zhang, J., and Yuan, Y. (2010). KIDS:
K-anonymization data stream base on sliding window.
In Future Computer and Communication (ICFCC),
2010 2nd International Conference on (Vol. 2, pp. V2-
311).
AdaptiveBufferResizingforEfficientAnonymizationofStreamingDatawithMinimalInformationLoss
201