Distributed Privacy preserving and Handling Privacy information leakage by using k -anonymity algorithm

Abstract

There is increasing pressure to share health information and even make it publicly available. However, such disclosures of personal health information raise serious privacy concerns. To alleviate such concerns, it is possible to anonymize the data before disclosure. One popular anonymization approach is k-anonymity. There have been no evaluations of the actual re-identification probability of k-anonymized data sets. Through a simulation, we evaluated the re-identification risk of k-anonymization and three different improvements on three large data sets. Re-identification probability is measured under two different re-identification scenarios. Information loss is measured by the commonly used discernability metric. For one of the re-identification scenarios, k-Anonymity consistently over-anonymous data sets, with this over-anonymization being most pronounced with small sampling fractions. Over-anonymization results in excessive distortions in the data (i.e., high information loss), making the data less useful for subsequent analysis. We found that a hypothesis testing approach provided the best control over re-identification risk and reduces the extent of information loss compared to baseline kanonymity. Guidelines are provided on when to use the hypothesis testing approach instead of baseline k-anonymity.

Authors and Affiliations

Padmapriya. G, Dr. M. Hemalatha

Keywords

Related Articles

Six Sigma Methodologies: A Review Case Study

Six Sigma process methodologies that focuses on quantitatively measuring a process in order to control and improve upon it and strives for 3.4 defects per million opportunities (DPMO) so that it is within six standard d...

Bot Detection using Traffic Monitoring and Traffic Analysis

Botnet is peak extensive spread and occurs normally in today’s cyber attacks, resulting in severe intimidations to our network possessions and group’s properties. Botnets are congregation of negotiated computer (Bots) w...

A Totally New Approach Towards Describing Gravity and hence Quantum Gravity

What is gravity? Is it curving of spacetime due to the presence of energy, momentum? In order to make a quantum mechanical model of gravity we need to change our thoughts about what gravity. We need to forget about spac...

Evaluating An Electrical Discharge Machining Parameters With Using Titanium Nano Particle Mixed Dielectric Medium

Electric discharge machining is un-conventional machining process. Electrical discharge machine is commonly used for machining for those materials which are cannot processed by conventional machining process. Electrical...

Threads in Operating System

This paper basically deals with threads used in an operating system. We have focused on the working and the ways of multithreaded system, how they are used to write a program in an efficient and effective way. The first...

Download PDF file
  • EP ID EP19150
  • DOI -
  • Views 626
  • Downloads 23

How To Cite

Padmapriya. G, Dr. M. Hemalatha (2014). Distributed Privacy preserving and Handling Privacy information leakage by using k -anonymity algorithm. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(12), -. https://europub.co.uk/articles/-A-19150