A Study on Models and Techniques of Anonymization in Data Publishing
DOI:
https://doi.org/10.32628/IJSRSET19629Keywords:
Privacy Models, Anonymization Techniques, Data Publishing, Privacy Preservation.Abstract
In the era where world runs online the storing and publishing of data online has also increased to a great extent. In this era a large amount of information is collected and published to a network which is publically available. With the exposure of data comes the risk of information leakage of an individual while publishing the data online. Hence for the same we need a security system for preserving the privacy of individual and here the concept of preserving privacy in data publishing came into existence. To achieve this privacy different privacy models and techniques have been proposed which gives different levels of resistance against different attacks by adversaries. In this paper we will discuss about these models and techniques and have a comparative study among them.
References
- P. Samarati and L. Sweeney “Protecting Privacy when Disclosing Information: k- Anonymity and Its Enforcement through Generalization and Suppression” Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory, 1998.
- Ashwin Machanavajjhala ,Johannes Gehrke and Daniel Kifer “ l-Diversity: Privacy Beyond k-Anonymity” 22nd International Conference on Data Engineering (ICDE'06) pp. 24-35, April 2006.
- Ninghui Li, Tiancheng Li and Suresh Venkatasubramanian “t-Closeness: Privacy Beyond k-Anonymity and l-Diversity” 2007 IEEE 23rd International Conference on Data Engineering pp. 106-115, April 2007.
- B.Santhosh Kumar and K.V.Rukmani “Novel Privacy notion t-closeness: Privacy Preserving Data Mining” NCACEIT'11 pp. 1-5 , January 2011
- Avinash Kumar Singh, Narayan P. Keer and Anand Motwani “A Review of Privacy Preservation Technique” International Journal of Computer Applications vol. 90 pp.17-20, February 2014.
- Yang Xu,Tinghuai Ma , Meili Tang and Wei Tian
- “A Survey of Privacy Preserving Data Publishing using Generalization and Suppression” Applied Mathematics & Information Sciences An International Journal vol.8 pp.1103-1116, May 2014.
- Benjamin C. M. Fung, Ke Wang, Rui Chen and Philip S. Yu “Privacy-Preserving Data Publishing: A Survey of Recent Developments” ACM Computing Surveys vol. 42 pp. 1-53 June 2010.
- Xianmang He, Yanghua Xiao, Yujia Li and Qing Wang “Permutation Anonymization: Improving Anatomy for Privacy Preservation in Data Publication” New Frontiers in Applied Data Mining PAKDD pp. 111-123 , May 2011
- Dong Li, Xianmang He, LongBin Cao and Huahui Chen “Permutation anonymization” Journal of Intelligent Information Systems vol. 47, pp.427-445 August 2015.
- Tiancheng Li, Ninghui Li, Jian Zhang and Ian Molloy “Slicing: A New Approach to Privacy Preserving Data Publishing” IEEE Transactions on Knowledge and Data Engineering.vol. 24 pp. 561-574 March 2012.
- Vijay R. Sonawane, Kanchan S. Rahinj “A New Data Anonymization Technique used For Membership Disclosure Protection” International Journal of Innovative Research in Science, Engineering and Technology vol. 2 pp.1230-1233, April 2013
- Arshveer Kaur “A Hybrid Approach of Privacy Preserving Data Mining using Suppression and Perturbation Techniques” International Conference on Innovative Mechanisms for Industry Applications (ICIMIA 2017) pp. 306-311, February 2017.
- P. Samarati. “Protecting respondent's privacy in microdata release” IEEE Transactions on Knowledge and Data Engineering, vol. 13 pp. 1010–1027, November 2001.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.