A Review on K-Anonymization Techniques

Journal Title: Scholars Journal of Engineering and Technology - Year 2017, Vol 5, Issue 6

Abstract

Securing information protection is an imperative issue in microdata distribution. Anonymity strategies regularly mean to ensure singular security, with insignificant effect on the nature of the discharged information. As of late, a couple of models are acquainted with guarantee the security ensuring or potentially to diminish the data misfortune to such an extent as could be allowed. That is, they additionally enhance the adaptability of the anonymous system to make it all the more near reality, and after that to meet the various needs of the general population. Different proposition and calculations have been intended for them in the meantime. In this paper a review of anonymity techniques for privacy preserving. In this paper, the discussion about the anonymity models, the significant execution ways and the techniques of anonymity algorithm, and also analyzed their strength and limitations. Keywords: Anonymity techniques, anonymity models, privacy preserving algorithm.

Authors and Affiliations

Anisha Tiwari, Minu Choudhary

Keywords

Related Articles

Flow-Based Model for Joint Routing and Request Routing in Hybrid Content Delivery Networks

Growing number of users, increasing popularity of large-scale multimedia content and high requirements for quality of delivery the content lead to integration of Content Delivery Networks (CDN) and Peer-to-Peer (P2P) net...

A Review of Agent Based Interoperability Frameworks and Interoperability Assessment Models

In a heterogeneous world, concurrent distributed development has led to many types of multi-agent systems that offer diverse functionality in agents as different types of platforms are not in a position to interoperate....

Optimal Design and Structural Analysis of Internally Pressurized Thin-Walled Shells

The objective of this study is to utilize nonlinear constrained optimization to optimally design and analyze the features of an internally pressurized thin-walled shell for mini liquefied petroleum gas storage and transp...

Ethical Use of Computer Technology

Virtually every tool is accompanied with “how to use” and how to maximize use in a bid to minimize possible problems or technological setback that it might bring. The study of computer ethics is a way of generating and r...

Sensitized solar cell on polymer substrates

TiO2 films with excellent mechanical adhesion were prepared on indium tin oxide (ITO) coated polyethylene naphthalate (PEN) substrates. Optical properties of TiO2 films were studied. An organic dye 1-(2-hydroxycarbonyl-p...

Download PDF file
  • EP ID EP386596
  • DOI -
  • Views 78
  • Downloads 0

How To Cite

Anisha Tiwari, Minu Choudhary (2017). A Review on K-Anonymization Techniques. Scholars Journal of Engineering and Technology, 5(6), 238-245. https://europub.co.uk/articles/-A-386596