Anonymizied Approach to Preserve Privacy of Published Data Through Record Elimination

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3

Abstract

 Abstract: Data mining is the process of analyzing data. Data Privacy is collection of data and dissemination of data. Privacy issues arise in different area such as health care, intellectual property, biological data, financial transaction etc. It is very difficult to protect the data when there is transfer of data. Sensitive information must be protected. There are two kinds of major attacks against privacy namely record linkage and attribute linkage attacks. Research have proposed some methods namely k-anonymity, ℓ-diversity, t-closeness for data privacy. K-anonymity method preserves the privacy against record linkage attack alone. It is unable to prevent address attribute linkage attack. ℓ-diversity method overcomes the drawback of k-anonymity method. But it fails to prevent identity disclosure attack and attribute disclosure attack. t-closeness method preserves the privacy against attribute linkage attack but not identity disclosure attack. A proposed method used to preserve the privacy of individuals’ sensitive data from record and attribute linkage attacks. In the proposed method, privacy preservation is achieved through generalization by setting range values and through record elimination. A proposed method overcomes the drawback of both record linkage attack and attribute linkage attack

Authors and Affiliations

Sakshi Agrawal

Keywords

Related Articles

 Sliced Ridgelet Transform for Image Denoising

 Image denoising based on ridgelet transforms gives better result in image denoising than standard wavelet transforms. In this research work, the researcher introduces a new approach for image denoising that is ba...

 Control of coding in DTN’s for progressive packet arrivals dynamically”

Abstract: In Delay Tolerant Networks (DTNs) the core challenge is to cope with lack of persistent connectivity and yet be able to deliver messages from source to destination. In particular, routing schemes that leverage...

Role Based and Energy Efficient Trust System for Clustered Wsn

Security and trust are two interdependent concepts and are often used interchangeably when defining a secure wireless sensor network (WSN) system .However, security is different from trust in that, it assumes no node is...

 Green Computing and Energy Consumption Issues in the Modern  Age

 Green computing concept is to improve environmental condition. The main aim of green computing is to reduce  toxic materials. We systematically analyze its energy consumption which is based on types of &nbs...

 Security in Body Sensor Networks for Healthcare applications

 This paper offers a depth review of numerous Wireless Sensor/detector Systems. Healthcare applications are considered as talented fields for Wireless Sensor Networks, where patients can be watchedusing wireless me...

Download PDF file
  • EP ID EP162844
  • DOI 10.9790/0661-1637102105
  • Views 98
  • Downloads 0

How To Cite

Sakshi Agrawal (2014).  Anonymizied Approach to Preserve Privacy of Published Data Through Record Elimination. IOSR Journals (IOSR Journal of Computer Engineering), 16(3), 102-105. https://europub.co.uk./articles/-A-162844