K-Anonymization Techniques for Hiding Multi-Sensitive Information

Journal Title: Scholars Journal of Engineering and Technology - Year 2017, Vol 5, Issue 6

Abstract

Securing information protection is an imperative issue in microdata distribution. Anonymity strategies regularly mean to ensure singular security, with insignificant effect on the nature of the discharged information. As of late, a couple of models are acquainted with guarantee the security ensuring or potentially to diminish the data misfortune to such an extent as could be allowed. That is, they additionally enhance the adaptability of the anonymous system to make it all the more near reality, and after that to meet the various needs of the general population. Different proposition and calculations have been intended for them in the meantime. In this paper, we present two anonymization techniques for adding vertices and edges for hiding useful information. The algorithm for adding edges executes faster as compared to algorithm for adding vertices but hiding information capability is more in vertices adding algorithm because it add vertices implied that it also add edges so it becomes more robust. Keywords: Anonymity techniques, anonymity models, privacy preserving algorithm.

Authors and Affiliations

Anisha Tiwari, Minu Choudhary

Keywords

Related Articles

Intrusion Detection System Techniques and Tools: A Survey

An Intrusion Detection System (IDS) is a system that tries to perform intrusion detection by comparing observable behaviour against suspicious patterns. The objective of intrusion detection is to monitor network resource...

Existence and uniqueness of positive solutions for singular second order Sturm-Liouville problems with impulse actions

By mixed monotone method, we establish the existence and uniqueness of positive solutions for singular second order Sturm-Liouville problems with impulse actions. The theorems obtained are very general and complement pre...

Estimation of Groundwater Resources using Groundwater-Hydrograph Analysis, a Case of Linbian and Donggang basins

This study applied groundwater fluctuation method (GFM) and considered the natural groundwater recession rate to analyze the groundwater storage levels of the Donggang River and Linbian River basins. Subsequently, the sa...

Compression of Video Using JPEG2000 (J2K)

JPEG2000 (J2K) to compress the video and also maintains the quality of the video. JPEG2000 (J2K) to compress the video on three concepts: storing the video sequence frames to provide quality and spatial resolution scalab...

Reduction of pollution by using Fly ash, bottom ash and granulated blast furnace slag in geopolymer building materials

There are many ways to reduce environmental pollution (carbon dioxide) that causes by production of Portland cement and cause by the increasing of waste material. Geopolymer concrete results from the reaction of a source...

Download PDF file
  • EP ID EP386595
  • DOI -
  • Views 101
  • Downloads 0

How To Cite

Anisha Tiwari, Minu Choudhary (2017). K-Anonymization Techniques for Hiding Multi-Sensitive Information. Scholars Journal of Engineering and Technology, 5(6), 232-237. https://europub.co.uk/articles/-A-386595