Skip to main content

Performance Analysis of Various Anonymization Techniques for Privacy Preservation of Sensitive Data

  • Conference paper
  • First Online:
International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018 (ICICI 2018)

Abstract

Various domains like health care, observing the life of the wild in the forest area, surveillance, etc. have started using the technologies like Wireless Sensor Networks (WSN). Internet of Things (IoT) is also another technology which is used in this regard. WSN based applications generate humungous data due to the continuous monitoring and data logging feature of WSN. This invokes the need to handle humungous magnitude of data and various Big Data frameworks help to handle it. Along with the management of huge amount of data, another issue to be handled is the management of sensitive data. The issue of protecting the secrecy of the data becomes an essentially important area for research. Most of the times, the challenge involved in handling sensitive data is the necessity that the data needs to be published to public media. There exists various problems in data publishing. The problem associated is to preserve the information that is confidential and delicate yet publish useful data. The concept of protecting the privacy of the data involves publishing data without allowing the unauthorized users to access sensitive information. The proposed work focuses on analysis of various techniques in privacy preservation of sensitive data and it is referred as Anonymization. The different anonymization techniques considered for analysis are t-closeness, differential privacy, slicing, k-anonymity and l-diversity. An experimental setup is developed and datasets from Google Financial is used to fractionate the execution of the various anonymization techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, J., Luo, Y., Zhao, Y., Le, J.: A survey on privacy preserving data mining. In: First International Workshop on Database and Applications, August 2009

    Google Scholar 

  2. Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: 21st IEEE International Conference on Data Engineering (ICDE), pp. 217–228 (2005)

    Google Scholar 

  3. Antony, J., Antony, S.T.: A survey on privacy preservation in big data. Int. J. Eng. Sci. Invention Res. Dev. (IJESIRD) 3(3) (2016)

    Google Scholar 

  4. Antony, J., Antony, S.T.: A review on privacy preservation in big data. Int. J. Mod. Comput. Sci. Appl. (IJMCSA) 4(6) (2016)

    Google Scholar 

  5. Sreevidya, B.: An enhanced and productive technique for privacy preserving mining of association rule from horizontal distributed database. Int. J. Appl. Eng. Res. 10(8) (2015)

    Google Scholar 

  6. Sasikala, T., Ala, N.K., Gorantla, R.: Software based prototype for data confidentiality in databases. Int. J. Appl. Eng. Res. 10(14), 34369–34371 (2015)

    Google Scholar 

  7. Paliwal, D., Sreevidya, B.: Design and development of an intelligent web application for direct consumer to consumer trading over internet. In: International Conference on Inventive Communication and Computational Technologies, ICICCT 2017 (2017)

    Google Scholar 

  8. Antony, J., Antony, S.T.: A privacy preservation framework for big data using differential privacy and overlapped slicing. In: International Conference on Big data infrastructure and cloud computing, October 2016

    Google Scholar 

  9. Li, N., Li, T., Venkatasubramanian, S.: tcloseness: privacy beyond kanonymity and l-diversity. In: 21st IEEE International Conference on Data Engineering (ICDE) (2006)

    Google Scholar 

  10. Machanavajjhala, A., Kifer, G., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1) (2007)

    Article  Google Scholar 

  11. Nithya, M., Sheela, T.: A comparative study on privacy preserving data mining techniques. Int. J. Mod. Eng. Res. (IJMER) 4(7) (2014)

    Google Scholar 

  12. Mohammed, N., Chen, R., Fung, B., Yu, P.S.: Differentially private data release for data mining. In: 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 493–501. ACM (2011)

    Google Scholar 

  13. Mogre Neha, V., Sulbha, P.: Slicing: an approach for privacy preservation in high-dimensional data using anonymization technique. In: IRAJ International Conference, Pune (2013)

    Google Scholar 

  14. Neha. P., Lade, S., Gupta, R.: Quasi and sensitive attribute based perturbation technique for privacy preservation. In: IJARCSSE, vol. 5, No. 11, November 2015

    Google Scholar 

  15. Jain, P., Gyanchandani, M., Khare, N.: Big data privacy: a technological perspective and review. J. Big Data (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Rajesh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sreevidya, B., Rajesh, M., Sasikala, T. (2019). Performance Analysis of Various Anonymization Techniques for Privacy Preservation of Sensitive Data. In: Hemanth, J., Fernando, X., Lafata, P., Baig, Z. (eds) International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018. ICICI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 26. Springer, Cham. https://doi.org/10.1007/978-3-030-03146-6_77

Download citation

Publish with us

Policies and ethics