Distributed Privacy preserving and Handling Privacy information leakage by using k -anonymity algorithm
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 12
Abstract
There is increasing pressure to share health information and even make it publicly available. However, such disclosures of personal health information raise serious privacy concerns. To alleviate such concerns, it is possible to anonymize the data before disclosure. One popular anonymization approach is k-anonymity. There have been no evaluations of the actual re-identification probability of k-anonymized data sets. Through a simulation, we evaluated the re-identification risk of k-anonymization and three different improvements on three large data sets. Re-identification probability is measured under two different re-identification scenarios. Information loss is measured by the commonly used discernability metric. For one of the re-identification scenarios, k-Anonymity consistently over-anonymous data sets, with this over-anonymization being most pronounced with small sampling fractions. Over-anonymization results in excessive distortions in the data (i.e., high information loss), making the data less useful for subsequent analysis. We found that a hypothesis testing approach provided the best control over re-identification risk and reduces the extent of information loss compared to baseline kanonymity. Guidelines are provided on when to use the hypothesis testing approach instead of baseline k-anonymity.
Authors and Affiliations
Padmapriya. G, Dr. M. Hemalatha
Analysis of Dense Wavelength Division Multiplexing Using Different Optical Amplifiers
This paper analyzes the performance of Dense Wavelength Division Multiplexing (DWDM) using different optical amplifiers. In the proposed work, DWDM system consist of 120 channels having 0.25 nm channel spacing using RAM...
Fracture studies on Basalt Fiber
This fracture studies focus on the mechanical properties of textile composites with respect to their matrix and reinforcement. This analysis of composites represents the fabrication of ceramic reinforcement materials an...
Wireless Vehicular Communications
The deployment of vehicular communication (VC) systems is strongly dependent on their security and privacy features. We propose security architecture for VC. Developments took place over the past few years in the area o...
Biometric-A Fraud Reduction Technology in E-payment and its impact on Inclusive Growth of India
Inclusive growth is very important for the progress of developing nations and it is not possible without financial inclusion. Government has already given directives on financial inclusion and most Indian banks and othe...
Improving Copy-Move Forgery Detection Time by Using DCT, Correlation and SOBEL Edge Detector
Copy move image forgery is often used in which region of an image is copied and pasted at another location to hide an important scene, clone or duplicate the number of aspects in the same image. Block representing have...