Distributed Privacy preserving and Handling Privacy information leakage by using k -anonymity algorithm
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 12
Abstract
There is increasing pressure to share health information and even make it publicly available. However, such disclosures of personal health information raise serious privacy concerns. To alleviate such concerns, it is possible to anonymize the data before disclosure. One popular anonymization approach is k-anonymity. There have been no evaluations of the actual re-identification probability of k-anonymized data sets. Through a simulation, we evaluated the re-identification risk of k-anonymization and three different improvements on three large data sets. Re-identification probability is measured under two different re-identification scenarios. Information loss is measured by the commonly used discernability metric. For one of the re-identification scenarios, k-Anonymity consistently over-anonymous data sets, with this over-anonymization being most pronounced with small sampling fractions. Over-anonymization results in excessive distortions in the data (i.e., high information loss), making the data less useful for subsequent analysis. We found that a hypothesis testing approach provided the best control over re-identification risk and reduces the extent of information loss compared to baseline kanonymity. Guidelines are provided on when to use the hypothesis testing approach instead of baseline k-anonymity.
Authors and Affiliations
Padmapriya. G, Dr. M. Hemalatha
Assessment of Water Quality Index of Shahpura Lake Bhopal and It’s Restoration
The water of Shahpura Lake is suffering from severe contamination which is due to heavy discharge of pollutants without adequate treatment to remove harmful compounds. This is leading to the damaging effects not only to...
Performance and Emission Characteristics of Biodiesel with CaO Nanocatalyst
With the depletion of fossil fuels worldwide, country has been sort for different fuel opportunities which can enrich the vehicle and give the best operating performances as like normal fuel sources. Hence the best way...
Fixture for bundle cutting of tubes and rods in saw cutting machine
Indian public and government undertaking manufacturing sectors have been manufacturing products with the help of conventional type and semi-automatic type machines, jigs, fixtures since their inception.it is impossible...
Li-Fi: Life of Possibilities
The field of technology is something that never stops growing; it is a perpetually progressive field that simply does not stop. When it comes to connectivity, the science and technology has processed greatly. With all t...
Java Applet Security
Java's early growth was spurred by code downloadable over a network, better known as APPLETS. Applet security has evolved with the growth of Java, and today is a source of frequent confusion due to the variety of Java v...