Title :
Research on Privacy Protection Based on K-Anonymity
Author :
Ren, Xiangmin ; Yang, Jing
Author_Institution :
Coll. of Comput. Sci. & Technol., Harbin Eng. Univ., Harbin, China
Abstract :
With the rising of data mining technology and the appearances of data stream and uncertain data technology etc, individual data, the enterprise data are possibly leaked at any moments, so the data security has become nowadays the main topic of information security. The common way to protect privacy is to use K-anonymity in data publishing. This paper will analyse comprehensively the current research situation of K-anonymity model used to prevent privacy leaked in data publishing, introduce the technology of K-anonymity, generalization and suppression, illustrate K-anonymity evaluation criterion, and assess many different algorithms used currently. Finally, the future directions in this field are discussed.
Keywords :
business data processing; data mining; data privacy; publishing; security of data; K-anonymity evaluation criterion; data mining technology; data publishing; data security; data stream; data technology; enterprise data; information security; privacy protection; Computer science; Data engineering; Data mining; Data privacy; Data security; Databases; Educational institutions; Information security; Protection; Publishing;
Conference_Titel :
Biomedical Engineering and Computer Science (ICBECS), 2010 International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-5315-3
DOI :
10.1109/ICBECS.2010.5462427