Anonymizied Approach to Preserve Privacy of Published Data Through Record Elimination
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Data mining is the process of analyzing data. Data Privacy is collection of data and dissemination of data. Privacy issues arise in different area such as health care, intellectual property, biological data, financial transaction etc. It is very difficult to protect the data when there is transfer of data. Sensitive information must be protected. There are two kinds of major attacks against privacy namely record linkage and attribute linkage attacks. Research have proposed some methods namely k-anonymity, ℓ-diversity, t-closeness for data privacy. K-anonymity method preserves the privacy against record linkage attack alone. It is unable to prevent address attribute linkage attack. ℓ-diversity method overcomes the drawback of k-anonymity method. But it fails to prevent identity disclosure attack and attribute disclosure attack. t-closeness method preserves the privacy against attribute linkage attack but not identity disclosure attack. A proposed method used to preserve the privacy of individuals’ sensitive data from record and attribute linkage attacks. In the proposed method, privacy preservation is achieved through generalization by setting range values and through record elimination. A proposed method overcomes the drawback of both record linkage attack and attribute linkage attack
Authors and Affiliations
Sakshi Agrawal
Establishing Point to Point Connections Among IoT Devices Over the Internet
The rapid growth in the number of devices connected to the internet, other than computers, has proposed the Internet of Things (IoT) era. These devices make use of the high availability of internet connection to intercha...
Performance Evaluation of IPv4 Vs Ipv6 and TunnellingTechniques Using Optimized Network Engineering Tools(OPNET)
Abstract: Internet Protocol version 6 (IPv6) is the latest version of the Internet Protocol (IP). IPv6 is intendedto replace IPv4, which is still widely used, in order to deal with the problem of IPv4 address exhau...
Biometric Fingerprint Combination to Improve AnonymityProtection
Abstract: Fingerprint techniques are widely used in authentication systems, therefore its privacy protectionbecomes an important issue. Securing a stored fingerprint template is very important because once fingerpr...
Classified Ave Rage Precision For Capturing User Search Intention For Multiattributes
Due to the tremendous increase in use of internet surfing user may not get the most accurate search result which they preferred for their queries to clarify their known uncertain information. Such search engine may not o...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc network
Smartphone’s users has been increasing since last few years which provides numerous operations like accessing information through online mode, payment options, using utility applications, playing games. Sma...