Abstract
Need of collection and sharing of data is increasing day by day as it is the requirement of today’s society. While publishing data, one has to guarantee that sensitive information should be made secret so that no one is able to misuse it. For this purpose, one can use various methods and techniques of anonymization. A number of recent researchers are focusing on proposing different anonymity algorithms and techniques to keep published data secret. In this paper, a review of various methods of anonymity with different anonymity operators and various types of linkage attacks has been done. An analysis of the performance of various anonymity algorithms on the basis of various parameters on different data sets using ARX data anonymity software has been done in the end.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yang X, Ma T, Tang M, Tian W (2014) A survey of privacy preserving data publishing using generalization and suppression. An Int J Appl Math Inf Sci 8(3):1103–1116
Byun J-W, Kamra A, Li N (2007) Effiecient k-anonymization using clutering techniues, DASFAA 2007, LNCS 4443. Springer, Berlin, pp 188–200
LevFevre K, Dewitt DJ, Raghu R (2005) Incognito: efficient full-domain k-anonymity. In Proceeding of ACM SIGMOD, pp 49–60, New York, 2005
Bayardo RJ (2005) Data privacy through optimal k-anonymization. In: International conference on data engineering, pp 217–228, Washington, DC, USA, 2005
Fung, BCM, Wang K, Yu PS (2005) Top–down specification for information and privacy preservation, In: Proceeding of 21th IEEE international conference on data engineering, ICDE’05, pp 205–216, Tokyo, Japan 2005
Wong RCW, Li J, Fu AWC, Wang K (2006) (α, k)-Anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: Proceeding of 12th international conference on knowledge discovery and data mining, pp 754–759, Philadelphia, PA, 2006
Xu J, Wang W, Pei J, Wang X, Shi B, Fu AWC (2006) Utility-base anonymization using local recoding. In: Proceedings of 12th international conference on knowledge discovery and data mining, pp 785–790, Philadelphia, PA, USA, 2006
Mirashe MS, Hande KN (2015) Survey on efficient technique for annonymized microdata preservation. Int J Emerg Dev 2(5):97–103, ISSN 2249-6149
Fung BCM, Wang, K, Fu AWC, Yu PS (2011) Introduction to privacy preserving data publishing concepts and techniques. CRC Press, Taylor and Francis Group, New York, p 13, ISBN 978-1-4200-9148-9
Sweeney L (2002) k-Anonymity: a model for protecting privacy. Int J Uncertan Fuzziness, Knowl-Based Syst 10:557–570
Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M (2006) l-Diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd IEEE international conference on data engineering (ICDE), Atlanta, GA, 2006
Ashoka K, Poornima B (2014) A survey of latest developments in privacy preserving data publishing. Int J Adv Inf Sci Technol 32(32):1–10, ISSN 319:2682
Machanavajjjhala A, Kifer D, Gehrke J, Venkitasaubramaniam M (2007) l-Diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data 1(1): 1–57
Li N, Li T (2007) t-Closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of 21st IEEE international conference on data engineering ICDE), Istanbul, Turkey, April 2007
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Narula, D., Kumar, P., Upadhyaya, S. (2018). Privacy Preservation Using Various Anonymity Models. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_13
Download citation
DOI: https://doi.org/10.1007/978-981-10-8536-9_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8535-2
Online ISBN: 978-981-10-8536-9
eBook Packages: EngineeringEngineering (R0)