Distributed Privacy preserving and Handling Privacy information leakage by using k -anonymity algorithm

Abstract

There is increasing pressure to share health information and even make it publicly available. However, such disclosures of personal health information raise serious privacy concerns. To alleviate such concerns, it is possible to anonymize the data before disclosure. One popular anonymization approach is k-anonymity. There have been no evaluations of the actual re-identification probability of k-anonymized data sets. Through a simulation, we evaluated the re-identification risk of k-anonymization and three different improvements on three large data sets. Re-identification probability is measured under two different re-identification scenarios. Information loss is measured by the commonly used discernability metric. For one of the re-identification scenarios, k-Anonymity consistently over-anonymous data sets, with this over-anonymization being most pronounced with small sampling fractions. Over-anonymization results in excessive distortions in the data (i.e., high information loss), making the data less useful for subsequent analysis. We found that a hypothesis testing approach provided the best control over re-identification risk and reduces the extent of information loss compared to baseline kanonymity. Guidelines are provided on when to use the hypothesis testing approach instead of baseline k-anonymity.

Authors and Affiliations

Padmapriya. G, Dr. M. Hemalatha

Keywords

Related Articles

slugNeurological Disorder Diagnosis System

In this paper we have presented Neurological Disorder Diagnosis System. This paper present an account of RuleBased Expert System (RBES) for Neurological Disorders, i.e., Alzheimer, Parkinson, Tetanus disease, Cerebral Pa...

Hertz Contact Stress Analysis and Validation Using Finite Element Analysis

In general machines are designed with a set of elements to reduce cost, ease of assembly and manufacturability etc. One also needs to address stress issues at the contact regions between any two elements, stress is indu...

A Critical Review on Modelling of Industrial Chimney

Chimneys are characterising landmarks of power plants and industrial setups. Chimneys are required to carry vertically and discharge, gaseous products of combustion, chemical waste gases, and exhaust air from and indust...

slugPerformance Analysis of Clustering Algorithms in Data Mining

Clustering is a primary data description method in data mining which group’s most similar data. The data clustering is an important problem in a wide variety of fields. Including data mining, pattern recognition, and bi...

Review Paper of Design and Analysis of Two Wheeler Vehicles Rear Shock Absorber

The Hydraulic rectifier can works as a Energy Generator and Shock absorber by converting bi directional shocks into unidirectional rotation with help of 4 check valve. Passive Damper can be converted into active damper...

Download PDF file
  • EP ID EP19150
  • DOI -
  • Views 700
  • Downloads 23

How To Cite

Padmapriya. G, Dr. M. Hemalatha (2014). Distributed Privacy preserving and Handling Privacy information leakage by using k -anonymity algorithm. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(12), -. https://europub.co.uk/articles/-A-19150