Distributed Privacy preserving and Handling Privacy information leakage by using k -anonymity algorithm

Abstract

There is increasing pressure to share health information and even make it publicly available. However, such disclosures of personal health information raise serious privacy concerns. To alleviate such concerns, it is possible to anonymize the data before disclosure. One popular anonymization approach is k-anonymity. There have been no evaluations of the actual re-identification probability of k-anonymized data sets. Through a simulation, we evaluated the re-identification risk of k-anonymization and three different improvements on three large data sets. Re-identification probability is measured under two different re-identification scenarios. Information loss is measured by the commonly used discernability metric. For one of the re-identification scenarios, k-Anonymity consistently over-anonymous data sets, with this over-anonymization being most pronounced with small sampling fractions. Over-anonymization results in excessive distortions in the data (i.e., high information loss), making the data less useful for subsequent analysis. We found that a hypothesis testing approach provided the best control over re-identification risk and reduces the extent of information loss compared to baseline kanonymity. Guidelines are provided on when to use the hypothesis testing approach instead of baseline k-anonymity.

Authors and Affiliations

Padmapriya. G, Dr. M. Hemalatha

Keywords

Related Articles

Congestion Control Ability of AODV and AOMDV Routing Protocols in MANET

This Mobile Ad hoc Network (MANET) is forming the dynamic topology and maintained connectivity with neighbor nodes. The routing protocols of MANET are completely different with other network (Wired and Wireless) because...

slugStudy of Efficacy of Riser and Downcomer Plates as Light Receivers: For microalgae Culture in a Vertical Flat Plate Airlift Photobioreactor

Photobioreactor are considered to have high productivity in a controlled condition for microalgae cultivation. Among different types of photobioreactor, tubular and vertical airlift systems were evaluated to be effectiv...

Modified Sacchurum Officinarum (Sugarcane Bagasse [Sb]) Activated Powder Used as a Natural Adsorbent for the Removal of Cadmium (Cd) From Simulated Wastewater (Aqueous Solution)

Cadmium is one of the heavy metals that have been classified by the World Health Organization (WHO) to be of serious health concern (Hundal, 1998). The “itai-itai” disease which is of cadmium toxicity in humans, kidney...

slugAnalysis of IP Micro Mobility Protocols: A Review

Node mobility between distinct subnets inside domain or between distinct domains is manged by IP mobility management protocols which are of two types: IP Macro Mobility protocols and IP Micro Mobility protocols. IP Macr...

Automated Medical Counter (AMC)

The need to go to the hospital, take all the necessary tests, consult a doctor and then buy their prescribed medicine takes more time. In the proposed system AMC (Automated Medical Counter) which works similarly to an A...

Download PDF file
  • EP ID EP19150
  • DOI -
  • Views 627
  • Downloads 23

How To Cite

Padmapriya. G, Dr. M. Hemalatha (2014). Distributed Privacy preserving and Handling Privacy information leakage by using k -anonymity algorithm. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(12), -. https://europub.co.uk/articles/-A-19150