DocumentCode :
2340242
Title :
Research on Privacy Protection Based on K-Anonymity
Author :
Ren, Xiangmin ; Yang, Jing
Author_Institution :
Coll. of Comput. Sci. & Technol., Harbin Eng. Univ., Harbin, China
fYear :
2010
fDate :
23-25 April 2010
Firstpage :
1
Lastpage :
5
Abstract :
With the rising of data mining technology and the appearances of data stream and uncertain data technology etc, individual data, the enterprise data are possibly leaked at any moments, so the data security has become nowadays the main topic of information security. The common way to protect privacy is to use K-anonymity in data publishing. This paper will analyse comprehensively the current research situation of K-anonymity model used to prevent privacy leaked in data publishing, introduce the technology of K-anonymity, generalization and suppression, illustrate K-anonymity evaluation criterion, and assess many different algorithms used currently. Finally, the future directions in this field are discussed.
Keywords :
business data processing; data mining; data privacy; publishing; security of data; K-anonymity evaluation criterion; data mining technology; data publishing; data security; data stream; data technology; enterprise data; information security; privacy protection; Computer science; Data engineering; Data mining; Data privacy; Data security; Databases; Educational institutions; Information security; Protection; Publishing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Biomedical Engineering and Computer Science (ICBECS), 2010 International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-5315-3
Type :
conf
DOI :
10.1109/ICBECS.2010.5462427
Filename :
5462427
Link To Document :
بازگشت