Abstract
In recent years, the storage and management of personal data for individuals have increased rapidly, and the method of protecting personal information has grown rapidly. There are multiple purposes in which personal data can be misused. Privacy has become a major issue for high-level databases. To address these issues, several anonymization techniques have recently been suggested to safeguard data privacy. In this particular paper, we present a provisional analysis of K-anonymity, L-diversity, and T-Clogens anonymization methods based on privacy and security criteria for the higher dimensional database.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen B-C, Kifer D, LeFevre K, Machanavajjhala A (2009) Privacy-preserving data publishing. Found Trends Databases 2(1–2):1–167
Li N, Li T, Venkatasubramanian S (2007) T-Closeness: privacy beyond kAnonymity and L-Diversity. In 23rd IEEE International Conference on Data Engineering. IEEE Press, Istanbul, pp 106–115
Shanthi AS, Karthikeyan M (2012) A review on privacy preserving data mining. In: IEEE International Conference on Computational Intelligence and Computing
Wang P (2010) Survey on privacy preserving data mining. Int J Digital Content Technol its Appl 4
Kedar S, Dhawale S, Vaibhav W, Kadam P, Wani S, Ingale P (2013) Privacy preserving data mining. Int J Adv Res Comput Commun Eng 2(4)
Sweeney L (2002) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertainty, Fuzziness Knowl-Based Syst 10(5):571–588
Lin J, Wei M (2008) An efficient clustering method for k-anonymization. In: Proceedings of the 2008 international workshop on privacy and anonymity in information society .ACM, New York, pp 26–35
Byun J, Kamra A, Bertino E, Li N (2007) Efficient k-anonymization using clustering techniques. In: Kotagiri R, Krishna P, Mohania M, Nantajeewarawat E (eds) Advances in databases: concepts, systems and applications, vol 4443. LNCS. Springer, Heidelberg, pp 188–200
LeFevre K, DeWitt D, Ramakrishnan R (2005) Incognito: efficient full-domain K-anonymity. In: International conference on management of data. ACM, New York, pp 49–60
Tripathy B, Ghosh A, Panda G (2012) Kernel based K-means clustering using rough set. In: International conference on computer communication and informatics. IEEE Press, Coimbatore, pp 1–5
Data Anonymization. http://www.slideshare.net/KaiX/lions-zebras-and-bigdata-anonymization
l-diversity and t-closeness. http://www.utdallas.edu/~muratk/courses/dbsec12f_files/DBSec_priv3.pdf
Ciriani V, Vimercati V, Foresti S, Samarati P (2007) k-Anonymity. In: Kikuchi H, Rannenberg K (eds) Advances in information and computer security. LNCS, vol 4752. Springer, Heidelberg
Xiao X, Tao Y (2006) Personalized privacy preservation. In: International conference on management of data. ACM, New York, pp 229–240
Li N, Li T, Venkatasubramanian S (2007) T-Closeness: privacy beyond kAnonymity and L-Diversity. In: 23rd IEEE international conference on data engineering. IEEE Press, Istanbul, pp 106–115
Machanavajjhala A, Gehrke J, Kifer D (2006) L-diversity: privacy beyond KAnonymity. In: 22nd international conference on data engineering. IEEE Press, Atlanta, GA, USA, pp 24
Tripathy B, Maity A, Ranajit B, Chowdhuri D (2011) A fast p-sensitive l-diversity Anonymisation algorithm. In: Recent advances in intelligent computational systems (RAICS). IEEE Press, Trivandrum, pp 741–744
Yongcheng L, Jiajin L, Jian W (2009) Survey of anonymity techniques for privacy preserving. In: International symposium on computing, communication, and control. IACSIT Press, Singapore, pp 248–252
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Dutta, A., Bhattacharyya, A., Sen, A. (2021). Comparative Analysis of Anonymization Techniques. In: Das, P.K., Tripathy, H.K., Mohd Yusof, S.A. (eds) Privacy and Security Issues in Big Data. Services and Business Process Reengineering. Springer, Singapore. https://doi.org/10.1007/978-981-16-1007-3_5
Download citation
DOI: https://doi.org/10.1007/978-981-16-1007-3_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-1006-6
Online ISBN: 978-981-16-1007-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)