K-Anonymization Techniques for Hiding Multi-Sensitive Information

Journal Title: Scholars Journal of Engineering and Technology - Year 2017, Vol 5, Issue 6

Abstract

Securing information protection is an imperative issue in microdata distribution. Anonymity strategies regularly mean to ensure singular security, with insignificant effect on the nature of the discharged information. As of late, a couple of models are acquainted with guarantee the security ensuring or potentially to diminish the data misfortune to such an extent as could be allowed. That is, they additionally enhance the adaptability of the anonymous system to make it all the more near reality, and after that to meet the various needs of the general population. Different proposition and calculations have been intended for them in the meantime. In this paper, we present two anonymization techniques for adding vertices and edges for hiding useful information. The algorithm for adding edges executes faster as compared to algorithm for adding vertices but hiding information capability is more in vertices adding algorithm because it add vertices implied that it also add edges so it becomes more robust. Keywords: Anonymity techniques, anonymity models, privacy preserving algorithm.

Authors and Affiliations

Anisha Tiwari, Minu Choudhary

Keywords

Related Articles

A Linear Programming Model of Multi-class Support Vector Machine

The structure of K-SVCR algorithm is ‘one-against-one-against-rest’.Its advantage is in the process of each decomposition , make all training points of information have been fully taken advantage of. To a certain extent...

Verification of the Primary Stability of Bone-Implant Non Manifold Assembly (Prosthetic Joint) using Hertzian Contact Mechanics Model

The problem with hip replacement technology is a challenging one and no addition to that effort is a wasted venture. The aim of this work considering stainless steel SS316L as the implant material was to investigate the...

Research and development of fault zone in sand and mudstone interbed formation

Fault deformation mechanism and internal structure of fault zone are the basis of fault sealing and fluid migration along the fault zone. The inner structure and the controlling effect of the internal structure and the c...

Evaluation of Basic Parameters about Heating Properties of Nano Drilling Fluid- New Aspect

Experiments are held to investigate the effect of ferric oxide nano particles on the thermo electrical properties of drilling slurry. The main purpose of this study is to improve the thermo electrical properties of drill...

Design and Construction of a Wireless Remotely Controlled Video Capturing Vehicle II

The Video Capturing Vehicle (VCV) is a robotic video capturing vehicle with full ground mobility. The control of the robotic vehicle is achieved using Dual Tone Multi Frequency (DTMF) technique. The VCV is controlled by...

Download PDF file
  • EP ID EP386595
  • DOI -
  • Views 90
  • Downloads 0

How To Cite

Anisha Tiwari, Minu Choudhary (2017). K-Anonymization Techniques for Hiding Multi-Sensitive Information. Scholars Journal of Engineering and Technology, 5(6), 232-237. https://europub.co.uk/articles/-A-386595