Distributed Privacy preserving and Handling Privacy information leakage by using k -anonymity algorithm
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 12
Abstract
There is increasing pressure to share health information and even make it publicly available. However, such disclosures of personal health information raise serious privacy concerns. To alleviate such concerns, it is possible to anonymize the data before disclosure. One popular anonymization approach is k-anonymity. There have been no evaluations of the actual re-identification probability of k-anonymized data sets. Through a simulation, we evaluated the re-identification risk of k-anonymization and three different improvements on three large data sets. Re-identification probability is measured under two different re-identification scenarios. Information loss is measured by the commonly used discernability metric. For one of the re-identification scenarios, k-Anonymity consistently over-anonymous data sets, with this over-anonymization being most pronounced with small sampling fractions. Over-anonymization results in excessive distortions in the data (i.e., high information loss), making the data less useful for subsequent analysis. We found that a hypothesis testing approach provided the best control over re-identification risk and reduces the extent of information loss compared to baseline kanonymity. Guidelines are provided on when to use the hypothesis testing approach instead of baseline k-anonymity.
Authors and Affiliations
Padmapriya. G, Dr. M. Hemalatha
Embeeded Automatic Vehicle Control System Using Voice Recognition On ARM 7 Processor
This paper gives the design and implementation of embedded system for voice recognition in automatic vehicle driving using ARM cortex A7 for physically challenged people. ARM cortex A7 has features such as low power con...
Vigilant Spy Robot used in Warfield
It is well known fact that, most of the tasks in military applications are more dangerous than others. These tasks can be solved by an autonomous robot. So we are using a robot instead of human solider. This robot is us...
slugAn Evolutionary Algorithm for Automated Test Data Generation for Software Programs
Software testing takes a considerable amount of time and resources spent on producing software it would be useful to have ways to reduce the cost of software testing so one of them is automatic test data generator- a sy...
A Hybrid Solar Wind Power Generation System
World has shifted its outlook towards the cleaner sources of energy. Energy generation in balance with sustainable development has led to energy generation from non-conventional, renewable energy sources like solar ener...
slugFuzzy Logic Controller based Shunt Active Filter
In this analysis Shunt Active Power Filter (APF) is proposed for the compensation of harmonic currents and reactive power. For this purpose, a fuzzy logic controller is developed to adjust the energy storage of the dc v...