Call for Paper - July 2023 Edition
IJCA solicits original research papers for the July 2023 Edition. Last date of manuscript submission is June 20, 2023. Read More

Anonymity: An Assessment and Perspective in Privacy Preserving Data Mining

Print
PDF
International Journal of Computer Applications
© 2010 by IJCA Journal
Number 10 - Article 1
Year of Publication: 2010
Authors:
Sumana M
Dr Hareesh K S
10.5120/1113-1457

Sumana M and Dr Hareesh K S. Article: Anonymity: An Assessment and Perspective in Privacy Preserving Data Mining. International Journal of Computer Applications 6(10):1–5, September 2010. Published By Foundation of Computer Science. BibTeX

@article{key:article,
	author = {Sumana M and Dr Hareesh K S},
	title = {Article: Anonymity: An Assessment and Perspective in Privacy Preserving Data Mining},
	journal = {International Journal of Computer Applications},
	year = {2010},
	volume = {6},
	number = {10},
	pages = {1--5},
	month = {September},
	note = {Published By Foundation of Computer Science}
}

Abstract

Privacy Preserving Data mining techniques depends on privacy, which captures what information is sensitive in the original data and should therefore be protected from either direct or indirect disclosure. Secrecy and anonymity are useful ways of thinking about privacy. This privacy should be measureable and entity to be considered private should be valuable. In this paper, we discuss the various anonymization techniques that can be used for privatizing data. The goal of anonymization is to secure access to confidential information while at the same time releasing aggregate information to the public. The challenge in each of the techniques is to protect data so that they can be published without revealing confidential information that can be linked to specific individuals. Also protection is to be achieved with minimum loss of the accuracy sought by database users. Different approaches of anonymization have been discussed and a comparison of the same has been provided.

Reference

  • Han Jian-min, Yu Hui-qun, Yu Juan, Cen Ting-ting “A Complete (α,k)-Anonymity Model for Sensitive Values Individuation Preservation”, 2008 IEEE DOI 10.1109/ISECS.2008.92
  • Latanya Sweeney “Achieving k-anonymity Privacy Protection Using Generalization and Suppression”,May 2002, International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), 2002; 571-588.
  • V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati, k-Anonymity, Springer US, Advances in Information Security (2007).
  • Li Liu, Murat Kantarcioglu and Bhavani Thuraisingham, Privacy Preserving Decision Tree Mining from Perturbed Data, Proceedings of the 42nd Hawaii International Conference on System Sciences – 2009
  • Charu C Aggarwal, Philip S Yu, Privacy Preserving Data Mining: Models and Algorithms, Springer Publication, 2007.
  • Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian, t-Closeness: Privacy Beyond k-Anonymity and ℓ-Diversity, Citiseer 2007