Skip to main content

Comparative Analysis of Anonymization Techniques

  • Chapter
  • First Online:
Privacy and Security Issues in Big Data

Abstract

In recent years, the storage and management of personal data for individuals have increased rapidly, and the method of protecting personal information has grown rapidly. There are multiple purposes in which personal data can be misused. Privacy has become a major issue for high-level databases. To address these issues, several anonymization techniques have recently been suggested to safeguard data privacy. In this particular paper, we present a provisional analysis of K-anonymity, L-diversity, and T-Clogens anonymization methods based on privacy and security criteria for the higher dimensional database.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen B-C, Kifer D, LeFevre K, Machanavajjhala A (2009) Privacy-preserving data publishing. Found Trends Databases 2(1–2):1–167

    Google Scholar 

  2. Li N, Li T, Venkatasubramanian S (2007) T-Closeness: privacy beyond kAnonymity and L-Diversity. In 23rd IEEE International Conference on Data Engineering. IEEE Press, Istanbul, pp 106–115

    Google Scholar 

  3. Shanthi AS, Karthikeyan M (2012) A review on privacy preserving data mining. In: IEEE International Conference on Computational Intelligence and Computing

    Google Scholar 

  4. Wang P (2010) Survey on privacy preserving data mining. Int J Digital Content Technol its Appl 4

    Google Scholar 

  5. Kedar S, Dhawale S, Vaibhav W, Kadam P, Wani S, Ingale P (2013) Privacy preserving data mining. Int J Adv Res Comput Commun Eng 2(4)

    Google Scholar 

  6. Sweeney L (2002) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertainty, Fuzziness Knowl-Based Syst 10(5):571–588

    Article  MathSciNet  Google Scholar 

  7. Lin J, Wei M (2008) An efficient clustering method for k-anonymization. In: Proceedings of the 2008 international workshop on privacy and anonymity in information society .ACM, New York, pp 26–35

    Google Scholar 

  8. Byun J, Kamra A, Bertino E, Li N (2007) Efficient k-anonymization using clustering techniques. In: Kotagiri R, Krishna P, Mohania M, Nantajeewarawat E (eds) Advances in databases: concepts, systems and applications, vol 4443. LNCS. Springer, Heidelberg, pp 188–200

    Chapter  Google Scholar 

  9. LeFevre K, DeWitt D, Ramakrishnan R (2005) Incognito: efficient full-domain K-anonymity. In: International conference on management of data. ACM, New York, pp 49–60

    Google Scholar 

  10. Tripathy B, Ghosh A, Panda G (2012) Kernel based K-means clustering using rough set. In: International conference on computer communication and informatics. IEEE Press, Coimbatore, pp 1–5

    Google Scholar 

  11. Data Anonymization. http://www.slideshare.net/KaiX/lions-zebras-and-bigdata-anonymization

  12. l-diversity and t-closeness. http://www.utdallas.edu/~muratk/courses/dbsec12f_files/DBSec_priv3.pdf

  13. Ciriani V, Vimercati V, Foresti S, Samarati P (2007) k-Anonymity. In: Kikuchi H, Rannenberg K (eds) Advances in information and computer security. LNCS, vol 4752. Springer, Heidelberg

    Google Scholar 

  14. Xiao X, Tao Y (2006) Personalized privacy preservation. In: International conference on management of data. ACM, New York, pp 229–240

    Google Scholar 

  15. Li N, Li T, Venkatasubramanian S (2007) T-Closeness: privacy beyond kAnonymity and L-Diversity. In: 23rd IEEE international conference on data engineering. IEEE Press, Istanbul, pp 106–115

    Google Scholar 

  16. Machanavajjhala A, Gehrke J, Kifer D (2006) L-diversity: privacy beyond KAnonymity. In: 22nd international conference on data engineering. IEEE Press, Atlanta, GA, USA, pp 24

    Google Scholar 

  17. Tripathy B, Maity A, Ranajit B, Chowdhuri D (2011) A fast p-sensitive l-diversity Anonymisation algorithm. In: Recent advances in intelligent computational systems (RAICS). IEEE Press, Trivandrum, pp 741–744

    Google Scholar 

  18. Yongcheng L, Jiajin L, Jian W (2009) Survey of anonymity techniques for privacy preserving. In: International symposium on computing, communication, and control. IACSIT Press, Singapore, pp 248–252

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Dutta, A., Bhattacharyya, A., Sen, A. (2021). Comparative Analysis of Anonymization Techniques. In: Das, P.K., Tripathy, H.K., Mohd Yusof, S.A. (eds) Privacy and Security Issues in Big Data. Services and Business Process Reengineering. Springer, Singapore. https://doi.org/10.1007/978-981-16-1007-3_5

Download citation

Publish with us

Policies and ethics