Methods for Privacy Protection Using K-Anonymity

被引:0
|
作者
Sharma, Vijay [1 ]
机构
[1] Manav Rachna Int Univ Faridabad, FET, Faridabad, Haryana, India
来源
PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014) | 2014年
关键词
Anonymity; privacy; generalization;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Large amount of data is produced in electronic form by various governmental and non governmental organizations. This data also has information related to specific individual. Information related to specific individual needs to be protected, so that it may not harm the privacy. Moreover sensitive information related to organization also needs to be protected. Data is released from various organizations as it is demanded by researchers and data mining companies to develop newer and better methods for finding patterns and trends. Any organization who wished to release data has two goals, one is to release the data as close as possible to the original form and second to protect the privacy of individuals and sensitive information from being released. K-anonymity has been used as successful technique in this regard. This method provides a guarantee that released data is at least k-anonymous. Various methods have been suggested to achieve k-anonymity for the given dataset. I categories these methods into four main domains based on the principle these are based and methods they are applying to achieve k-anonymous data. These methods have their respective advantages and disadvantages relating to loss of information, feasibility in real world and suitability to the number of tuples in the dataset.
引用
收藏
页码:149 / 152
页数:4
相关论文
共 50 条
  • [1] K-Anonymity Privacy Protection Using Ontology
    Talouki, Maedeh Ashouri
    NematBakhsh, Mohammad-ali
    Baraani, Ahmad
    2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, : 681 - 684
  • [2] Research on K-Anonymity Algorithm in Privacy Protection
    Wang, Chen
    Liu, Lianzhong
    Gao, Lijie
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 194 - 196
  • [3] Achieving k-anonymity privacy protection using generalization and suppression
    Sweeney, L
    INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) : 571 - 588
  • [4] Protecting privacy using k-anonymity
    El Emam, Khaled
    Dankar, Fida Kamal
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2008, 15 (05) : 627 - 637
  • [5] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 483 - 490
  • [6] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 312 - 315
  • [7] Anatomy: Uncertain data k-anonymity privacy protection algorithm
    Ren, Xiangmin
    Jia, Boxuan
    Wang, Kechao
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1689 - +
  • [8] SocialCloaking: a Distributed Architecture for K-anonymity Location Privacy Protection
    Hwang, Ren-Hung
    Huang, Fu-Hui
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 247 - 251
  • [9] Research on uncertain data privacy protection based on K-anonymity
    Jing, Yang
    Xiangmin, Ren
    Jianpei, Zhang
    Kechao, Wang
    Jing, Y. (yangjing@hrbeu.edu.cn), 1600, Advanced Institute of Convergence Information Technology (04): : 140 - 149
  • [10] An Adaptive Learning Model for k-Anonymity Location Privacy Protection
    Natesan, Gayathri
    Liu, Jigang
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 10 - 16