Skip to main content

Privacy Preservation Using Various Anonymity Models

  • Conference paper
  • First Online:
Cyber Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 729))

Abstract

Need of collection and sharing of data is increasing day by day as it is the requirement of today’s society. While publishing data, one has to guarantee that sensitive information should be made secret so that no one is able to misuse it. For this purpose, one can use various methods and techniques of anonymization. A number of recent researchers are focusing on proposing different anonymity algorithms and techniques to keep published data secret. In this paper, a review of various methods of anonymity with different anonymity operators and various types of linkage attacks has been done. An analysis of the performance of various anonymity algorithms on the basis of various parameters on different data sets using ARX data anonymity software has been done in the end.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yang X, Ma T, Tang M, Tian W (2014) A survey of privacy preserving data publishing using generalization and suppression. An Int J Appl Math Inf Sci 8(3):1103–1116

    Article  Google Scholar 

  2. Byun J-W, Kamra A, Li N (2007) Effiecient k-anonymization using clutering techniues, DASFAA 2007, LNCS 4443. Springer, Berlin, pp 188–200

    Google Scholar 

  3. LevFevre K, Dewitt DJ, Raghu R (2005) Incognito: efficient full-domain k-anonymity. In Proceeding of ACM SIGMOD, pp 49–60, New York, 2005

    Google Scholar 

  4. Bayardo RJ (2005) Data privacy through optimal k-anonymization. In: International conference on data engineering, pp 217–228, Washington, DC, USA, 2005

    Google Scholar 

  5. Fung, BCM, Wang K, Yu PS (2005) Top–down specification for information and privacy preservation, In: Proceeding of 21th IEEE international conference on data engineering, ICDE’05, pp 205–216, Tokyo, Japan 2005

    Google Scholar 

  6. Wong RCW, Li J, Fu AWC, Wang K (2006) (α, k)-Anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: Proceeding of 12th international conference on knowledge discovery and data mining, pp 754–759, Philadelphia, PA, 2006

    Google Scholar 

  7. Xu J, Wang W, Pei J, Wang X, Shi B, Fu AWC (2006) Utility-base anonymization using local recoding. In: Proceedings of 12th international conference on knowledge discovery and data mining, pp 785–790, Philadelphia, PA, USA, 2006

    Google Scholar 

  8. Mirashe MS, Hande KN (2015) Survey on efficient technique for annonymized microdata preservation. Int J Emerg Dev 2(5):97–103, ISSN 2249-6149

    Google Scholar 

  9. Fung BCM, Wang, K, Fu AWC, Yu PS (2011) Introduction to privacy preserving data publishing concepts and techniques. CRC Press, Taylor and Francis Group, New York, p 13, ISBN 978-1-4200-9148-9

    Google Scholar 

  10. Sweeney L (2002) k-Anonymity: a model for protecting privacy. Int J Uncertan Fuzziness, Knowl-Based Syst 10:557–570

    Article  MathSciNet  Google Scholar 

  11. Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M (2006) l-Diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd IEEE international conference on data engineering (ICDE), Atlanta, GA, 2006

    Google Scholar 

  12. Ashoka K, Poornima B (2014) A survey of latest developments in privacy preserving data publishing. Int J Adv Inf Sci Technol 32(32):1–10, ISSN 319:2682

    Google Scholar 

  13. Machanavajjjhala A, Kifer D, Gehrke J, Venkitasaubramaniam M (2007) l-Diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data 1(1): 1–57

    Google Scholar 

  14. Li N, Li T (2007) t-Closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of 21st IEEE international conference on data engineering ICDE), Istanbul, Turkey, April 2007

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepak Narula .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Narula, D., Kumar, P., Upadhyaya, S. (2018). Privacy Preservation Using Various Anonymity Models. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8536-9_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8535-2

  • Online ISBN: 978-981-10-8536-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics