Anonymizied Approach to Preserve Privacy of Published Data Through Record Elimination

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3

Abstract

 Abstract: Data mining is the process of analyzing data. Data Privacy is collection of data and dissemination of data. Privacy issues arise in different area such as health care, intellectual property, biological data, financial transaction etc. It is very difficult to protect the data when there is transfer of data. Sensitive information must be protected. There are two kinds of major attacks against privacy namely record linkage and attribute linkage attacks. Research have proposed some methods namely k-anonymity, ℓ-diversity, t-closeness for data privacy. K-anonymity method preserves the privacy against record linkage attack alone. It is unable to prevent address attribute linkage attack. ℓ-diversity method overcomes the drawback of k-anonymity method. But it fails to prevent identity disclosure attack and attribute disclosure attack. t-closeness method preserves the privacy against attribute linkage attack but not identity disclosure attack. A proposed method used to preserve the privacy of individuals’ sensitive data from record and attribute linkage attacks. In the proposed method, privacy preservation is achieved through generalization by setting range values and through record elimination. A proposed method overcomes the drawback of both record linkage attack and attribute linkage attack

Authors and Affiliations

Sakshi Agrawal

Keywords

Related Articles

 Chip Implementation of Text Encryption and Decryption Algorithms

 Abstract: Cryptography is the science of using mathematics to encrypt and decrypt data. It enables to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except t...

 Model Based Software Timing Analysis Using Sequence Diagramfor Commercial Applications

 Abstract: The verification of running time of a program is necessary in designing a system with real lifeconstrain. Verification defines lower and upper bounds which reflects control flow that depends on data as we...

ICHALEC Improved Cluster Head And Low Energy Consumption Protocol In Wireless Sensor Network

Wireless Sensor Network is an emerging field for research in most of the aspects of mankind. It is a network composed of nodes without any central controller. Sensor network protocols have high ability to be used in each...

 Web Data mining-A Research area in Web usage mining

 Data mining technology has emerged as a means for identifying patterns and trends from large quantities of data. The data mining technology normally adopts data integration method to generate data warehouse, on...

 Android Malware: Study and analysis of malware for privacy  leak in ad-hoc network 

 Smartphone’s users has been increasing since last few years which provides numerous operations like accessing information through online mode, payment options, using utility applications, playing games.  Sma...

Download PDF file
  • EP ID EP162844
  • DOI 10.9790/0661-1637102105
  • Views 87
  • Downloads 0

How To Cite

Sakshi Agrawal (2014).  Anonymizied Approach to Preserve Privacy of Published Data Through Record Elimination. IOSR Journals (IOSR Journal of Computer Engineering), 16(3), 102-105. https://europub.co.uk/articles/-A-162844