Secure Techniques of Data Anonymization for Privacy Preservation

Main Article Content

Disha Dubli

Abstract

Abstract: Now a day's there is an extensive use of internet , the data present on it should be made available in a way that an individual's privacy is not affected. Recently, many organizations are accumulating gigantic amounts of data which are stored in huge databases. Data publisher gather data from data holders, and publicize this data to data recipient for mining, statistical analysis etc. The released data can reveal secret information of an individual. For providing security to the data, many anonymization techniques have been designed for privacy preserving and micro data publishing. This paper discusses various anonymization techniques such as generalization, bucketization, slicing and also provide a methodology for enhancing security in the slicing technique. Further, a comparative analysis of the proposed method with existing techniques is discussed.

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

P. Samarati and L. Sweeney, “Protecting privacy when disclosing information:-anonymity and its enforcement through generalization and suppression,†SRI International, SRI-CSL-98-04, 1998

L. Sweeney, “K-Anonymity: A model for protecting privacy,†International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10, no. 5, pp. 557–570, 2002.

M. Barbaro and T. Zeller, “A face is exposed for AOL searcher no. 4417749,†New York Times, 2006.

G. T. Duncan and D. Lambert, “Disclosure-limited data dissemination,†Journal of The American Statistical Association, pp. 10–28, 1986.

D. Lambert, “Measures of disclosure risk and harm,†Journal of Official Statistics, vol. 9, pp. 313–331, 1993.

M. E. Nergiz, M. Atzori, and C. Clifton, “Hiding the presence of individuals from shared databases,†in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), pp. 665–676, 2007

X. Xiao and Y. Tao, “Anatomy: Simple and Effective Privacy Preservation,†Proc. Int‟l Conf. Very Large Data Bases (VLDB), pp. 139-150, 2006.

H. Kargupta, S. Datta, Q.Wang, and K. Sivakumar, “On the privacy preserving properties of random data perturbation techniques,†in Proceedings of the International Conference on Data Mining (ICDM), p. 99, 2003.

Tiancheng Li, Ninghui Li, “Slicing: A New Approach for Privacy Preserving Data Publishing†IEEE Transactions On Knowledge And Data Engineering, Vol. 24, No. 3, March 2012

M. Terrovitis, N. Mamoulis, and P. Kalnis, “Privacy-Preserving Anonymization of Set-Valued Data,†Proc. Int’l Conf. Very Large Data Bases (VLDB), pp. 115-125, 2008.

Y. Xu, K. Wang, A.W.-C. Fu, and P.S. Yu, “Anonymizing Transaction Databases for Publication,†Proc. ACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining (KDD), pp. 767-775, 2008.