K-Anonymization Techniques for Hiding Multi-Sensitive Information

Journal Title: Scholars Journal of Engineering and Technology - Year 2017, Vol 5, Issue 6

Abstract

Securing information protection is an imperative issue in microdata distribution. Anonymity strategies regularly mean to ensure singular security, with insignificant effect on the nature of the discharged information. As of late, a couple of models are acquainted with guarantee the security ensuring or potentially to diminish the data misfortune to such an extent as could be allowed. That is, they additionally enhance the adaptability of the anonymous system to make it all the more near reality, and after that to meet the various needs of the general population. Different proposition and calculations have been intended for them in the meantime. In this paper, we present two anonymization techniques for adding vertices and edges for hiding useful information. The algorithm for adding edges executes faster as compared to algorithm for adding vertices but hiding information capability is more in vertices adding algorithm because it add vertices implied that it also add edges so it becomes more robust. Keywords: Anonymity techniques, anonymity models, privacy preserving algorithm.

Authors and Affiliations

Anisha Tiwari, Minu Choudhary

Keywords

Related Articles

Numerical Analysis of Temperature Depression in A Multi-Fin Array

The purpose of the present study is to analyze two-dimensional heat transfer analysis in arrayed fins with thermal dissipation. The heat conduction equation for the multi-fin array is solved employing finite element meth...

Enhancing the Quality of Bio-Medical Video using Super Resolution

Medical imaging or videoing is an important diagnosis instrument to determine the presence of certain diseases. Therefore increasing the video resolution should significantly improve the diagnosis ability for corrective...

An Approximation Algorithms for Facility Location Problems with Multi-type Clients

A new model of facility location problem referred to as a facility location problem with diverse type of customers was proposed. The problem can be described as follows: There is a set of clients and a set of potential s...

Vibration Reducer for Two wheeler by Magnetic Absorbing System

Vibration is a most and common issue for all automobile sectors in post the spring, hydraulic system is used to reduce the vibration. For that the magnetic shock absorbing system has been used to reduce the vibration. Ma...

On The Integral Solutions Of The Binary Quadratic Equation x2=15y2-11t

The binary quadratic Diophantine equation represented by , t odd is analysed for its non-zero distinct integer solutions. Employing the lemma of Brahmagupta, infinitely many integral solutions of the above Pell equatio...

Download PDF file
  • EP ID EP386595
  • DOI -
  • Views 69
  • Downloads 0

How To Cite

Anisha Tiwari, Minu Choudhary (2017). K-Anonymization Techniques for Hiding Multi-Sensitive Information. Scholars Journal of Engineering and Technology, 5(6), 232-237. https://europub.co.uk/articles/-A-386595