Performance Analysis of Various Anonymization Techniques for Privacy Preservation of Sensitive Data

被引:0
作者
Sreevidya, B. [1 ]
Rajesh, M. [1 ]
Sasikala, T. [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Comp Sci & Engn, Bengaluru, India
来源
INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018 | 2019年 / 26卷
关键词
Diversity; K-anonymity; T-closeness; Differential privacy; Slicing; Data utility;
D O I
10.1007/978-3-030-03146-6_77
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Various domains like health care, observing the life of the wild in the forest area, surveillance, etc. have started using the technologies like Wireless Sensor Networks (WSN). Internet of Things (IoT) is also another technology which is used in this regard. WSN based applications generate humungous data due to the continuous monitoring and data logging feature of WSN. This invokes the need to handle humungous magnitude of data and various Big Data frameworks help to handle it. Along with the management of huge amount of data, another issue to be handled is the management of sensitive data. The issue of protecting the secrecy of the data becomes an essentially important area for research. Most of the times, the challenge involved in handling sensitive data is the necessity that the data needs to be published to public media. There exists various problems in data publishing. The problem associated is to preserve the information that is confidential and delicate yet publish useful data. The concept of protecting the privacy of the data involves publishing data without allowing the unauthorized users to access sensitive information. The proposed work focuses on analysis of various techniques in privacy preservation of sensitive data and it is referred as Anonymization. The different anonymization techniques considered for analysis are t-closeness, differential privacy, slicing, k-anonymity and l-diversity. An experimental setup is developed and datasets from Google Financial is used to fractionate the execution of the various anonymization techniques.
引用
收藏
页码:687 / 693
页数:7
相关论文
共 15 条
  • [1] Antony J., 2016, INT C BIG DAT INFR C INT C BIG DAT INFR C
  • [2] Antony J., 2016, INT J MOD COMPUT SCI, V4
  • [3] Antony J., 2016, INT J ENG SCI INVENT, V3
  • [4] Bayardo RJ, 2005, PROC INT CONF DATA, P217
  • [5] Jain P., 2016, J BIG DATA-GER
  • [6] Li N., 2006, 21 IEEE INT C DAT EN 21 IEEE INT C DAT EN
  • [7] Machanavajjhala A., 2007, ACM Trans. Knowl. Discov. Data, V1, P3, DOI [DOI 10.1145/1217299.1217302, 10.1145/1217299.1217302]
  • [8] Mogre Neha V., 2013, IRAJ INT C PUN IRAJ INT C PUN
  • [9] Mohammed N, 2011, P 17 ACM SIGKDD INT, P493, DOI [DOI 10.1145/2020408.2020487, 10.1145/2020408.2020487]
  • [10] Neha P., 2015, IJARCSSE, V5