Anonymizied Approach to Preserve Privacy of Published Data Through Record Elimination

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3

Abstract

 Abstract: Data mining is the process of analyzing data. Data Privacy is collection of data and dissemination of data. Privacy issues arise in different area such as health care, intellectual property, biological data, financial transaction etc. It is very difficult to protect the data when there is transfer of data. Sensitive information must be protected. There are two kinds of major attacks against privacy namely record linkage and attribute linkage attacks. Research have proposed some methods namely k-anonymity, ℓ-diversity, t-closeness for data privacy. K-anonymity method preserves the privacy against record linkage attack alone. It is unable to prevent address attribute linkage attack. ℓ-diversity method overcomes the drawback of k-anonymity method. But it fails to prevent identity disclosure attack and attribute disclosure attack. t-closeness method preserves the privacy against attribute linkage attack but not identity disclosure attack. A proposed method used to preserve the privacy of individuals’ sensitive data from record and attribute linkage attacks. In the proposed method, privacy preservation is achieved through generalization by setting range values and through record elimination. A proposed method overcomes the drawback of both record linkage attack and attribute linkage attack

Authors and Affiliations

Sakshi Agrawal

Keywords

Related Articles

 Performance measurement of MANET routing protocols underBlackhole security attack

 Abstract: Unlike wired networks or other wireless networks, where the nodes communicate with each other viaan access point or a base station, wireless Mobile ad hoc network is an infrastructure less network where t...

 Port Site Tuberculous Infection a Case Report and Review of Literature

 As the surgeries done by laparoscopy are increasing, associated complications are also increasing. One among them is port site infection especially port site infections due to Atypical Mycobacteriae .There is a con...

 Methods of Gathering Data for Research Purpose and  Applications Using IJSER Acceptance Rate of Monthly Paper  Publication (March 2012 Edition-May 2013 Edition)

 A good number of scientist or researchers find it very difficult in carrying out their research work successfully due to lack of good knowledge of data collection method and application. Data is referred to as a...

Mining High Utility Itemsets from its Concise and Lossless Representations

Abstract: Mining high utility items from databases using the utility of items is an emerging technology.Recent algorithms have a drawback in the performance level considering memory and time.Novel strategy proposed here...

 "Randomized Visual Cryptography scheme for color images”

 Abstract: In this paper, we propose a new color visual cryptography scheme which is based on modified visualcryptography. Visual Cryptography is based on cryptography where n images are encoded in a way that onlyth...

Download PDF file
  • EP ID EP162844
  • DOI 10.9790/0661-1637102105
  • Views 111
  • Downloads 0

How To Cite

Sakshi Agrawal (2014).  Anonymizied Approach to Preserve Privacy of Published Data Through Record Elimination. IOSR Journals (IOSR Journal of Computer Engineering), 16(3), 102-105. https://europub.co.uk/articles/-A-162844