Privacy Preserving Updates for Anonymzation Data Using ℓ -Diversity
Keywords:
Privacy Protection Mechanism, k-anonymity, Access Control Mechanism, ?-diversityAbstract
To prevent misuse of sensitive data by the unauthorized/application users and provide both privacy and security of the sensitive data. The privacy preservation mechanism is to protect the data from unauthorized user. Privacy Protection Mechanism (PPM) can satisfy privacy requirements such as k-anonymity and l-diversity. The privacy protection mechanism (PPM) is a general method used to transform the original data into some anonymous form to prevent from accessing owners sensitive information. PPM meets privacy requirement through k-anonymity it provides better privacy for the sensitive information which is to sbe shared. The privacy is achieved by the high accuracy of the user information. The ? -diversity method is an extension of the k-anonymity method, it is more efficient than the k-anonymity method. It avoids the attacks like background knowledge attack and others in k-anonymity method. In this paper we analyze ?-diversity method with different techniques.
References
- Zahid Pervaiz, Arif Ghafoor, Walid G. Aref, "Precision-Bounded Access Control Using Sliding-Window Query Views for Privacy-Preserving Data Streams", IEEE Trans. Knowl. Data Eng, July 2015.
- Z.Pervaiz,W.G.Aref, A.Ghafoor,andN. Prabhu, "Accuracy constrained privacy-preserving access control mechanism for relational data", IEEE Trans. Knowl. Data Eng., April 2014.
- T. Ghanem, A. Elmagarmid, P. Larson, and W. Aref, "Supporting views in data stream management systems," ACM Trans. Database Syst., 2010.
- J. Cao, B. Carminati, E. Ferrari, and K. Tan, "Castle: Continuously anonymizing data streams," IEEE Trans. Dependable Secure Comput. May/Jun. 2011.
- C. Clifton and T. Tassa, "On syntactic anonymity and differential privacy," in Proc. IEEE Int. Conf. Data Eng. Workshop Privacy-Preserving Data Publication Anal., 2013.
- B. Zhou, Y. Han, J. Pei, B. Jiang, Y. Tao, and Y. Jia, "Continuous privacy preserving publishing of data streams," in Proc. 12th Int. Conf. Extending Database Technol.: Adv. Database Technol., 2009.
- Sai Wu,Xiaoli Wang,Sheng Wang, Zhenjie Zhang,"k-Anonymity for crowd sourcing Database" IEEE Trans. Knowl. Data Eng, sept 2014.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.