Performance Analysis of Various Anonymization Techniques for Privacy Preservation of Sensitive Data

  • B. Sreevidya
  • M. RajeshEmail author
  • T. Sasikala
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)


Various domains like health care, observing the life of the wild in the forest area, surveillance, etc. have started using the technologies like Wireless Sensor Networks (WSN). Internet of Things (IoT) is also another technology which is used in this regard. WSN based applications generate humungous data due to the continuous monitoring and data logging feature of WSN. This invokes the need to handle humungous magnitude of data and various Big Data frameworks help to handle it. Along with the management of huge amount of data, another issue to be handled is the management of sensitive data. The issue of protecting the secrecy of the data becomes an essentially important area for research. Most of the times, the challenge involved in handling sensitive data is the necessity that the data needs to be published to public media. There exists various problems in data publishing. The problem associated is to preserve the information that is confidential and delicate yet publish useful data. The concept of protecting the privacy of the data involves publishing data without allowing the unauthorized users to access sensitive information. The proposed work focuses on analysis of various techniques in privacy preservation of sensitive data and it is referred as Anonymization. The different anonymization techniques considered for analysis are t-closeness, differential privacy, slicing, k-anonymity and l-diversity. An experimental setup is developed and datasets from Google Financial is used to fractionate the execution of the various anonymization techniques.


Diversity K-anonymity T-closeness Differential privacy Slicing Data utility 


  1. 1.
    Wang, J., Luo, Y., Zhao, Y., Le, J.: A survey on privacy preserving data mining. In: First International Workshop on Database and Applications, August 2009Google Scholar
  2. 2.
    Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: 21st IEEE International Conference on Data Engineering (ICDE), pp. 217–228 (2005)Google Scholar
  3. 3.
    Antony, J., Antony, S.T.: A survey on privacy preservation in big data. Int. J. Eng. Sci. Invention Res. Dev. (IJESIRD) 3(3) (2016)Google Scholar
  4. 4.
    Antony, J., Antony, S.T.: A review on privacy preservation in big data. Int. J. Mod. Comput. Sci. Appl. (IJMCSA) 4(6) (2016)Google Scholar
  5. 5.
    Sreevidya, B.: An enhanced and productive technique for privacy preserving mining of association rule from horizontal distributed database. Int. J. Appl. Eng. Res. 10(8) (2015)Google Scholar
  6. 6.
    Sasikala, T., Ala, N.K., Gorantla, R.: Software based prototype for data confidentiality in databases. Int. J. Appl. Eng. Res. 10(14), 34369–34371 (2015)Google Scholar
  7. 7.
    Paliwal, D., Sreevidya, B.: Design and development of an intelligent web application for direct consumer to consumer trading over internet. In: International Conference on Inventive Communication and Computational Technologies, ICICCT 2017 (2017)Google Scholar
  8. 8.
    Antony, J., Antony, S.T.: A privacy preservation framework for big data using differential privacy and overlapped slicing. In: International Conference on Big data infrastructure and cloud computing, October 2016Google Scholar
  9. 9.
    Li, N., Li, T., Venkatasubramanian, S.: tcloseness: privacy beyond kanonymity and l-diversity. In: 21st IEEE International Conference on Data Engineering (ICDE) (2006)Google Scholar
  10. 10.
    Machanavajjhala, A., Kifer, G., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1) (2007)CrossRefGoogle Scholar
  11. 11.
    Nithya, M., Sheela, T.: A comparative study on privacy preserving data mining techniques. Int. J. Mod. Eng. Res. (IJMER) 4(7) (2014)Google Scholar
  12. 12.
    Mohammed, N., Chen, R., Fung, B., Yu, P.S.: Differentially private data release for data mining. In: 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 493–501. ACM (2011)Google Scholar
  13. 13.
    Mogre Neha, V., Sulbha, P.: Slicing: an approach for privacy preservation in high-dimensional data using anonymization technique. In: IRAJ International Conference, Pune (2013)Google Scholar
  14. 14.
    Neha. P., Lade, S., Gupta, R.: Quasi and sensitive attribute based perturbation technique for privacy preservation. In: IJARCSSE, vol. 5, No. 11, November 2015Google Scholar
  15. 15.
    Jain, P., Gyanchandani, M., Khare, N.: Big data privacy: a technological perspective and review. J. Big Data (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringAmrita School of Engineering, Amrita Vishwa VidyapeethamBengaluruIndia

Personalised recommendations