Abstract
Various domains like health care, observing the life of the wild in the forest area, surveillance, etc. have started using the technologies like Wireless Sensor Networks (WSN). Internet of Things (IoT) is also another technology which is used in this regard. WSN based applications generate humungous data due to the continuous monitoring and data logging feature of WSN. This invokes the need to handle humungous magnitude of data and various Big Data frameworks help to handle it. Along with the management of huge amount of data, another issue to be handled is the management of sensitive data. The issue of protecting the secrecy of the data becomes an essentially important area for research. Most of the times, the challenge involved in handling sensitive data is the necessity that the data needs to be published to public media. There exists various problems in data publishing. The problem associated is to preserve the information that is confidential and delicate yet publish useful data. The concept of protecting the privacy of the data involves publishing data without allowing the unauthorized users to access sensitive information. The proposed work focuses on analysis of various techniques in privacy preservation of sensitive data and it is referred as Anonymization. The different anonymization techniques considered for analysis are t-closeness, differential privacy, slicing, k-anonymity and l-diversity. An experimental setup is developed and datasets from Google Financial is used to fractionate the execution of the various anonymization techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wang, J., Luo, Y., Zhao, Y., Le, J.: A survey on privacy preserving data mining. In: First International Workshop on Database and Applications, August 2009
Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: 21st IEEE International Conference on Data Engineering (ICDE), pp. 217–228 (2005)
Antony, J., Antony, S.T.: A survey on privacy preservation in big data. Int. J. Eng. Sci. Invention Res. Dev. (IJESIRD) 3(3) (2016)
Antony, J., Antony, S.T.: A review on privacy preservation in big data. Int. J. Mod. Comput. Sci. Appl. (IJMCSA) 4(6) (2016)
Sreevidya, B.: An enhanced and productive technique for privacy preserving mining of association rule from horizontal distributed database. Int. J. Appl. Eng. Res. 10(8) (2015)
Sasikala, T., Ala, N.K., Gorantla, R.: Software based prototype for data confidentiality in databases. Int. J. Appl. Eng. Res. 10(14), 34369–34371 (2015)
Paliwal, D., Sreevidya, B.: Design and development of an intelligent web application for direct consumer to consumer trading over internet. In: International Conference on Inventive Communication and Computational Technologies, ICICCT 2017 (2017)
Antony, J., Antony, S.T.: A privacy preservation framework for big data using differential privacy and overlapped slicing. In: International Conference on Big data infrastructure and cloud computing, October 2016
Li, N., Li, T., Venkatasubramanian, S.: tcloseness: privacy beyond kanonymity and l-diversity. In: 21st IEEE International Conference on Data Engineering (ICDE) (2006)
Machanavajjhala, A., Kifer, G., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1) (2007)
Nithya, M., Sheela, T.: A comparative study on privacy preserving data mining techniques. Int. J. Mod. Eng. Res. (IJMER) 4(7) (2014)
Mohammed, N., Chen, R., Fung, B., Yu, P.S.: Differentially private data release for data mining. In: 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 493–501. ACM (2011)
Mogre Neha, V., Sulbha, P.: Slicing: an approach for privacy preservation in high-dimensional data using anonymization technique. In: IRAJ International Conference, Pune (2013)
Neha. P., Lade, S., Gupta, R.: Quasi and sensitive attribute based perturbation technique for privacy preservation. In: IJARCSSE, vol. 5, No. 11, November 2015
Jain, P., Gyanchandani, M., Khare, N.: Big data privacy: a technological perspective and review. J. Big Data (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Sreevidya, B., Rajesh, M., Sasikala, T. (2019). Performance Analysis of Various Anonymization Techniques for Privacy Preservation of Sensitive Data. In: Hemanth, J., Fernando, X., Lafata, P., Baig, Z. (eds) International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018. ICICI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 26. Springer, Cham. https://doi.org/10.1007/978-3-030-03146-6_77
Download citation
DOI: https://doi.org/10.1007/978-3-030-03146-6_77
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03145-9
Online ISBN: 978-3-030-03146-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)