A Review on K-Anonymization Techniques

Journal Title: Scholars Journal of Engineering and Technology - Year 2017, Vol 5, Issue 6

Abstract

Securing information protection is an imperative issue in microdata distribution. Anonymity strategies regularly mean to ensure singular security, with insignificant effect on the nature of the discharged information. As of late, a couple of models are acquainted with guarantee the security ensuring or potentially to diminish the data misfortune to such an extent as could be allowed. That is, they additionally enhance the adaptability of the anonymous system to make it all the more near reality, and after that to meet the various needs of the general population. Different proposition and calculations have been intended for them in the meantime. In this paper a review of anonymity techniques for privacy preserving. In this paper, the discussion about the anonymity models, the significant execution ways and the techniques of anonymity algorithm, and also analyzed their strength and limitations. Keywords: Anonymity techniques, anonymity models, privacy preserving algorithm.

Authors and Affiliations

Anisha Tiwari, Minu Choudhary

Keywords

Related Articles

High resolution sequence stratigraphic analysis of the 1 blocks of the ancient block of the block of the Daqing Oilfield

According to the core, drilling, logging, seismic and combined with the production test and other data, application of high resolution sequence stratigraphy theory, the Daqing oilfield in the ancient 1 block of the oilfi...

Lattice Points on the Homogeneous Cone

The ternary quadratic homogeneous equation representing homogeneous cone given by by is analyzed for its non-zero distinct integer points on it. Three different patterns of integer points satisfying the cone under consi...

Enhancing the Quality of Bio-Medical Video using Super Resolution

Medical imaging or videoing is an important diagnosis instrument to determine the presence of certain diseases. Therefore increasing the video resolution should significantly improve the diagnosis ability for corrective...

Commodity Pricing Mechanism Generalized Supply and Demand Equilibrium Research

"After Copenhagen age", the pattern of global energy, environment and resources, is under intense interest differentiation and reorganization. In order to natural gas as a new energy focus, took place in the global new e...

Based On Campus Network User Behavior Data Acquisition and Processing

This thesis analyzes the behavioral characteristics of network users on the campus network. After capturing and processing communication data and recovering sessions, we can know the group behaviors of the campus users....

Download PDF file
  • EP ID EP386596
  • DOI -
  • Views 65
  • Downloads 0

How To Cite

Anisha Tiwari, Minu Choudhary (2017). A Review on K-Anonymization Techniques. Scholars Journal of Engineering and Technology, 5(6), 238-245. https://europub.co.uk/articles/-A-386596