ISSN 2321-3256 (Electronic Version)  
IJSRNSC News
Current Issue
Special Issues
Archive Issue
Best Paper Award
Author Guidelines
Editors Guidelines
Review Process
Research Areas
Plagiarism Policy
Correction Policy
Publication Ethics
Subscription
 Download
       
    Paper Format
    Copyright Transfer Form
    Digital Certificate
       
Indexing
FAQs
 
Full Paper View
Comparison of various Anonymization Technique
G. Pannu1 , S. Verma2 , U. Arora3 , A. K. Singh 44
1 Department of Computer Applications, National Institute of Technology, Kurukshetra, India.
2 Department of Computer Applications, National Institute of Technology, Kurukshetra, India.
3 Department of Computer Applications, National Institute of Technology, Kurukshetra, India.
4 Department of Computer Applications, National Institute of Technology, Kurukshetra, India.
Correspondence should be addressed to: theshikhar3@gmail.com.
Section:Review Paper, Product Type: Journal
Vol.5 , Issue.6 , pp.16-20, Dec-2017

CrossRef-DOI:   https://doi.org/10.26438/ijsrnsc/v5i6.1620

Online published on Dec 31, 2017
Copyright © G. Pannu, S. Verma, U. Arora , A. K. Singh 4 . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 
View this paper at   Google Scholar | DPI Digital Library
  XML View PDF Download  
Citation :
IEEE Style Citation: G. Pannu, S. Verma, U. Arora , A. K. Singh 4 , “Comparison of various Anonymization Technique”, International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.16-20, 2017.

MLA Style Citation: G. Pannu, S. Verma, U. Arora , A. K. Singh 4 "Comparison of various Anonymization Technique." International Journal of Scientific Research in Network Security and Communication 5.6 (2017): 16-20.

APA Style Citation: G. Pannu, S. Verma, U. Arora , A. K. Singh 4 , (2017). Comparison of various Anonymization Technique. International Journal of Scientific Research in Network Security and Communication, 5(6), 16-20.
           
Abstract :
Cloud based service is in trend for storing the database. Thus, exposing the data of the individual to the outside world is at the risk. Our major concern is to maintain privacy so that the data of the individual is not exposed to the adversary. In this paper, various techniques, how they have implemented, its new ideas and the models in order to implement privacy have been discussed. Few such techniques discussed are k-anonymity, l-diversity, t-closeness, (X, Y) anonymity, δ-Presence. All these techniques have its own approaches to secure data but in future, further new approaches having less time and space complexity can be thought of.
Key-Words / Index Term :
Anonymization, Generalization, Supperession, Privacy
References :
[1] JHS Tomar, JS Kumar, "A Review on Big Data Mining Methods", International Journal of Scientific Research in Network Security and Communication, Vol.4, Issue.3, pp.7-14, 2016.
[2] X. Wu, X. Zhu, G. Q. Wu and W. Ding, "Data mining with big data," in IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 1, pp. 97-107, Jan. 2014.
[3] H. Taneja, Kapil and A. K. Singh, “Preserving Privacy of Patients based on Re-identification Risk,” 4th International Conference on Eco-friendly Computing and Communication Systems (ICECCS), vol. 70, pp. 448-454, 2015,.
[4] B. Zhou, J. Pei. And W. Luk,”A brief survey on anonymization technique for privacy preserving publishing of social network data,” ACM SIGKDD Explorations Newsletter, ACM New York, NY, USA, vol. 10, no. 2, pp. 12-22, Dec. 2008.
[5] T. Li and N. Li, "Injector: Mining Background Knowledge for Data Anonymization," 2008 IEEE 24th International Conference on Data Engineering, Cancun, pp. 446-455, 2008.
[6] R. Mahesh and T. Meyyappan, "Anonymization technique through record elimination to preserve privacy of published data," 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, Salem, pp. 328-332, 2013.
[7] M. Balusamy and S. Muthusundari, "Data anonymization through generalization using map reduce on cloud," Proceedings of IEEE International Conference on Computer Communication and Systems ICCCS14, Chennai, pp. 039-042, 2014.
[8] P. Deivanai, J. J. V. Nayahi and V. Kavitha, "A hybrid data anonymization integrated with suppression for preserving privacy in mining multi party data," 2011 International Conference on Recent Trends in Information Technology (ICRTIT), Chennai, Tamil Nadu, pp. 732-736, 2011.
[9] L. Sweeney, “k-anonymity: A model for protecting privacy,” International journal on uncertainty, fuzziness and knowledge-based systems, vol. 10 no. 5, pp. 557-570, 2002.
[10] A. Machanavajjhala, J. Gehrke, D. Kifer and M. Venkitasubramaniam, "L-diversity: privacy beyond k-anonymity," 22nd International Conference on Data Engineering (ICDE’06), Atlanta, GA, USA, pp. 24-24, 2006.
[11] K. Wang and B. C. M. Fung, “Anonymizing Sequential Realease,” KDD’06, Philadellphia, Pennsylvania, USA, August 20-23, pp. 1-10, 2006.
[12] N. Li, T. Li and S. Venkatasubramanian, "t-Closeness: Privacy Beyond k-Anonymity and l-Diversity," 2007 IEEE 23rd International Conference on Data Engineering, Istanbul, pp. 106-115, 2007.
[13] K. LeFevre, D. J. DeWitt and R. Ramakrishnan, “Incognito: Efficient Full-Domain K-Anonimity,” Proc. 2005 ACM Sigmod Int. Conf. Management of data, Maryland, June14-16, pp. 49-60, 2005.
[14] X. Xiao, K. Yi and Y. Tao, “The Hardness and approxiamation algorithm for l-diversity,” Proc. 13th Int. Conf. Extending Database Technology, Lausanne, Switzerland, March 22-26, pp. 135-146, 2010.
[15] M. E. Nergiz and C. Clifton, "δ-Presence without Complete World Knowledge," in IEEE Transactions on Knowledge and Data Engineering, vol. 22, no. 6, pp. 868-883, June 2010.
 
 
User Section
Login

If you do not have an account Click here for registration.
Email Id :   *
Password :   *
   
     
  Login 
     
New User?   Forgot Password
     
Authorization Required

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  submit@ijsrnsc.org or view contact page for more details.

Impact Factor
Year :  
 
 
 
 
Call for Reviewer
E-Publication

Publish Conference Souvenir/Proceeding, Thesis, Book with ISBN number

     Home l Terms & Conditions l Privacy Policy l
    © E-ISSN: 2321-3256 Copyright © IJSRNSC
This work is licensed under: CC-BY-NC-ND 4.0