K-Anonymization Techniques for Hiding Multi-Sensitive Information

Journal Title: Scholars Journal of Engineering and Technology - Year 2017, Vol 5, Issue 6

Abstract

Securing information protection is an imperative issue in microdata distribution. Anonymity strategies regularly mean to ensure singular security, with insignificant effect on the nature of the discharged information. As of late, a couple of models are acquainted with guarantee the security ensuring or potentially to diminish the data misfortune to such an extent as could be allowed. That is, they additionally enhance the adaptability of the anonymous system to make it all the more near reality, and after that to meet the various needs of the general population. Different proposition and calculations have been intended for them in the meantime. In this paper, we present two anonymization techniques for adding vertices and edges for hiding useful information. The algorithm for adding edges executes faster as compared to algorithm for adding vertices but hiding information capability is more in vertices adding algorithm because it add vertices implied that it also add edges so it becomes more robust. Keywords: Anonymity techniques, anonymity models, privacy preserving algorithm.

Authors and Affiliations

Anisha Tiwari, Minu Choudhary

Keywords

Related Articles

Investigation of Thermal Efficiency and Heat Flux Analysis of a Tube Boiller Used in Boiling Palm Nuts

Abstract:Heat energy and heat energy generation become significant in manufacturing, production and processing processes. Heat management is needed to avoid wastage of human efforts, cost implication, material sources ne...

Existence of Positive Solution for Nonlinear Third-Order Boundary Value Problem

The nonlinear third-order boundary value problem is studied in this work, where .The existence result of at least one positive solution to above third-order boundary value problem is obtained by using fixed point i...

Optimization of Process Parameters for the Ultimate Tensile Strength of Aluminium Alloy Sand Castings using Taguchi Method

An optimization technique for sand casting process parameters based on the Taguchi method is reported in this paper. While keeping some casting parameters constant, aluminium alloy castings were prepared by sand casting...

Hybrid Scheme: Two Factor Authentication using Graphical password with Pass point scheme in Cloud computing

Cloud Computing is a completely new concept in the research area. Cloud computing focuses new challenging security threat. Hacking and data leakage are the common threats in cloud computing. As the security due to hacker...

Design and Development of Inverted Down Draft Gasifier for Cooking Purpose

Energy is a key input for technological, industrial, social and economical development of a nation. However, a large number of consumers in domestic, agricultural, commercial and industrial sectors are faced with a situa...

Download PDF file
  • EP ID EP386595
  • DOI -
  • Views 86
  • Downloads 0

How To Cite

Anisha Tiwari, Minu Choudhary (2017). K-Anonymization Techniques for Hiding Multi-Sensitive Information. Scholars Journal of Engineering and Technology, 5(6), 232-237. https://europub.co.uk/articles/-A-386595