DocumentCode :
126755
Title :
Methods for privacy protection using k-anonymity
Author :
Sharma, Vishal
Author_Institution :
FET, Manav Rachna Int. Univ., Faridabad, India
fYear :
2014
fDate :
6-8 Feb. 2014
Firstpage :
149
Lastpage :
152
Abstract :
Large amount of data is produced in electronic form by various governmental and non governmental organizations. This data also has information related to specific individual. Information related to specific individual needs to be protected, so that it may not harm the privacy. Moreover sensitive information related to organization also needs to be protected. Data is released from various organizations as it is demanded by researchers and data mining companies to develop newer and better methods for finding patterns and trends. Any organization who wished to release data has two goals, one is to release the data as close as possible to the original form and second to protect the privacy of individuals and sensitive information from being released. K-anonymity has been used as successful technique in this regard. This method provides a guarantee that released data is at least k-anonymous. Various methods have been suggested to achieve k-anonymity for the given dataset. I categories these methods into four main domains based on the principle these are based and methods they are applying to achieve k-anonymous data. These methods have their respective advantages and disadvantages relating to loss of information, feasibility in real world and suitability to the number of tuples in the dataset.
Keywords :
data mining; data protection; data mining; data privacy protection; governmental organizations; information loss; k-anonymous data; nongovernmental organizations; Computers; Data privacy; Diseases; Hypertension; Anonymity; generalization; privacy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference on
Conference_Location :
Faridabad
Print_ISBN :
978-1-4799-3958-9
Type :
conf
DOI :
10.1109/ICROIT.2014.6798301
Filename :
6798301
Link To Document :
بازگشت