Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

Personalized Privacy Preserving Updates to Anonymous Databases

Print
PDF
IJCA Proceedings on National Conference on Innovative Paradigms in Engineering & Technology 2013
© 2013 by IJCA Journal
NCIPET2013 - Number 2
Year of Publication: 2013
Authors:
Rajeshwari Suryawanshi
Parul Bhanarkar
Girish Agrawal

Rajeshwari Suryawanshi, Parul Bhanarkar and Girish Agrawal. Article:. IJCA Proceedings on National Conference on Innovative Paradigms in Engineering & Technology 2013 NCIPET 2013(2):10-13, December 2013. Full text available. BibTeX

@article{key:article,
	author = {Rajeshwari Suryawanshi and Parul Bhanarkar and Girish Agrawal},
	title = {Article:},
	journal = {IJCA Proceedings on National Conference on Innovative Paradigms in Engineering & Technology 2013},
	year = {2013},
	volume = {NCIPET 2013},
	number = {2},
	pages = {10-13},
	month = {December},
	note = {Full text available}
}

Abstract

Privacy of individual's information in datasets is main concern in the present technological phase. Thus it is becoming an increasingly important issue in many data mining applications in various fields like medical research, hospital records maintenance, intelligence agencies etc. Many previous works has focused on generalization and suppression based anonymity which provides same amount of privacy preservation to all individuals. The paper focuses on devising private update techniques to database systems that supports notions of anonymity different than k-anonymity. Therefore the concept of personalized anonymity is used which performs the minimum generalization for satisfying everybody's requirements, and thus, retains the largest amount of information from the microdata. Personalized Privacy is achieved by using SA (sensitive Attribute)-generalization to protect privacy of individual. In the paper, a method to perform updates on personalizes anonymity based database is proposed and its design view is explained.

References

  • L. Sweeney, "k-Anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002.
  • A. Machanavajjhala, J. Gehrke, et al. , ?-diversity: Privacy beyond k-anonymity, In Proc. of ICDE, Apr. 2006. B
  • N. Li, T. Li, and S. Venkatasubramanian, t-Closeness: Privacy Beyond k-anonymity and l-Diversity, In Proc. Of ICDE, 2007, pp. 106-115.
  • P. Samarati, "Protecting Respondent's Privacy in Microdata Release, "IEEE Trans. Knowledge and Data Eng. ,vol. 13,no. 6,pp. 1010-1027, Nov. /Dec. 2001. W. and Marchionini, G. 1997.
  • Xiaokui Xiao, Yufei Tao "Personalized Privacy Preservation", SIGMOD 2006, June 27–29, 2006, Chicago, Illinois, USA. Copyright 2006 ACM 1595932569/ 06/0006
  • Alberto Trombetta ,Wei Jaing,Elisa Bertino and Lorenzo Bossi, "Privacy Preserving Updates to anonymous and Confidential database" IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 8, NO. 4, JULY/AUGUST 2011.
  • R. Agrawal, A. Evfimievski, and R. Srikant, "Information Sharing across Private Databases," Proc. ACM SIGMOD Int'l Conf. Management of Data, 2003.
  • Yehuda Lindell and Benny Pinkasy,"Secure Multiparty Computation for Privacy-Preserving Data Mining" 2005
  • A. Trombetta and E. Bertino, "Private Updates to Anonymous Databases," Proc. Int'l Conf. Data Eng. (ICDE), 2006.