Distributed Privacy preserving and Handling Privacy information leakage by using k -anonymity algorithm

Abstract

There is increasing pressure to share health information and even make it publicly available. However, such disclosures of personal health information raise serious privacy concerns. To alleviate such concerns, it is possible to anonymize the data before disclosure. One popular anonymization approach is k-anonymity. There have been no evaluations of the actual re-identification probability of k-anonymized data sets. Through a simulation, we evaluated the re-identification risk of k-anonymization and three different improvements on three large data sets. Re-identification probability is measured under two different re-identification scenarios. Information loss is measured by the commonly used discernability metric. For one of the re-identification scenarios, k-Anonymity consistently over-anonymous data sets, with this over-anonymization being most pronounced with small sampling fractions. Over-anonymization results in excessive distortions in the data (i.e., high information loss), making the data less useful for subsequent analysis. We found that a hypothesis testing approach provided the best control over re-identification risk and reduces the extent of information loss compared to baseline kanonymity. Guidelines are provided on when to use the hypothesis testing approach instead of baseline k-anonymity.

Authors and Affiliations

Padmapriya. G, Dr. M. Hemalatha

Keywords

Related Articles

Design and implementation of FPGA control unit for solar Application

Designing photovoltaic systems to maximize the output power Maximum Power Point Tracking (MPPT) is used. The new MPPT system is developed, using DC-DC converter. The design of FPGA control unit which includes the power...

How to Mitigate the Impact of Supply Chain Disruptions and Risks ?

In this dynamic environment, supply chain disruptions are increasing and leading to more pressures toward adapting and quickly responding in an agile way to that change. The purpose of this article is to explore how org...

Analysing Algorithms for Querying Encrypted Database

With the invent of cloud computing, database outsourcing has emerged as a new platform. After the introduction of Database-as-a-Service (DAS) model organizations are outsourcing management of their data to third party c...

Influence of Aluminum Doping on the Magnetic Properties of Li-Zn Spinel Ferrite

Lithium ferrite or doped-lithium ferrite are sustainable and potential magnetic material for the microwave applications. A series of Lithium-Zinc spinel ferrites doped by aluminium having general chemical formula Li0.5(...

Arm Based Vehicle Tracking System using Android Application

Currently almost of all people having an own vehicle. Theft is happening on road and sometimes driving insecurity places. The safe of vehicle is very essential for all people vehicles. Vehicle tracking and locking syste...

Download PDF file
  • EP ID EP19150
  • DOI -
  • Views 628
  • Downloads 23

How To Cite

Padmapriya. G, Dr. M. Hemalatha (2014). Distributed Privacy preserving and Handling Privacy information leakage by using k -anonymity algorithm. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(12), -. https://europub.co.uk/articles/-A-19150