A Review on K-Anonymization Techniques

Journal Title: Scholars Journal of Engineering and Technology - Year 2017, Vol 5, Issue 6

Abstract

Securing information protection is an imperative issue in microdata distribution. Anonymity strategies regularly mean to ensure singular security, with insignificant effect on the nature of the discharged information. As of late, a couple of models are acquainted with guarantee the security ensuring or potentially to diminish the data misfortune to such an extent as could be allowed. That is, they additionally enhance the adaptability of the anonymous system to make it all the more near reality, and after that to meet the various needs of the general population. Different proposition and calculations have been intended for them in the meantime. In this paper a review of anonymity techniques for privacy preserving. In this paper, the discussion about the anonymity models, the significant execution ways and the techniques of anonymity algorithm, and also analyzed their strength and limitations. Keywords: Anonymity techniques, anonymity models, privacy preserving algorithm.

Authors and Affiliations

Anisha Tiwari, Minu Choudhary

Keywords

Related Articles

Application of ionic liquid-based microwave-assisted extraction of anthocynin from lycium ruthenicum

Abstract: The anthocyanin of lycium ruthenicum was extracted using ionic liquid combined with microwave. The effects of ionic liquid species, ionic liquid concentration, microwave power and extraction time on the anthocy...

Filteration of Unwanted Text Messages From Online Social Networks Using Probabilisitc Classifier

Now-a-days, Online Social Networking sites are important part of human society. In other way a person maintains a social networking site account which is then used for the following purposes like building relations, for...

Opinion Mining and Sentiment Analysis in Data Mining

An essential part of our information-gathering behavior has constantly been to discover “what other people think”. With the explosion of Web 2.0 platforms such as blogs, discussion forums, peer-to-peer networks, and vari...

On The Integral Solutions Of The Binary Quadratic Equation x2=15y2-11t

The binary quadratic Diophantine equation represented by , t odd is analysed for its non-zero distinct integer solutions. Employing the lemma of Brahmagupta, infinitely many integral solutions of the above Pell equatio...

A New Method to Forecast of Office Building Electricity Consumption: Genetic Algorithm - Neural Network

Saving energy is becoming a trend in today's society, office as our research object, the power consumption is very huge. We can effectively predict and track the office electricity situation is more and more important. I...

Download PDF file
  • EP ID EP386596
  • DOI -
  • Views 104
  • Downloads 0

How To Cite

Anisha Tiwari, Minu Choudhary (2017). A Review on K-Anonymization Techniques. Scholars Journal of Engineering and Technology, 5(6), 238-245. https://europub.co.uk/articles/-A-386596