Performance Analysis of Various Anonymization Techniques for Privacy Preservation of Sensitive Data

被引:0
|
作者
Sreevidya, B. [1 ]
Rajesh, M. [1 ]
Sasikala, T. [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Comp Sci & Engn, Bengaluru, India
关键词
Diversity; K-anonymity; T-closeness; Differential privacy; Slicing; Data utility;
D O I
10.1007/978-3-030-03146-6_77
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Various domains like health care, observing the life of the wild in the forest area, surveillance, etc. have started using the technologies like Wireless Sensor Networks (WSN). Internet of Things (IoT) is also another technology which is used in this regard. WSN based applications generate humungous data due to the continuous monitoring and data logging feature of WSN. This invokes the need to handle humungous magnitude of data and various Big Data frameworks help to handle it. Along with the management of huge amount of data, another issue to be handled is the management of sensitive data. The issue of protecting the secrecy of the data becomes an essentially important area for research. Most of the times, the challenge involved in handling sensitive data is the necessity that the data needs to be published to public media. There exists various problems in data publishing. The problem associated is to preserve the information that is confidential and delicate yet publish useful data. The concept of protecting the privacy of the data involves publishing data without allowing the unauthorized users to access sensitive information. The proposed work focuses on analysis of various techniques in privacy preservation of sensitive data and it is referred as Anonymization. The different anonymization techniques considered for analysis are t-closeness, differential privacy, slicing, k-anonymity and l-diversity. An experimental setup is developed and datasets from Google Financial is used to fractionate the execution of the various anonymization techniques.
引用
收藏
页码:687 / 693
页数:7
相关论文
共 50 条
  • [1] PRIVACY PRESERVATION IN BIG DATA USING ANONYMIZATION TECHNIQUES
    Karle, Tanashri
    Vora, Deepali
    2017 1ST IEEE INTERNATIONAL CONFERENCE ON DATA MANAGEMENT, ANALYTICS AND INNOVATION (ICDMAI), 2017, : 340 - 343
  • [2] Anonymization Techniques for Privacy Preservation in eLearning
    Ivanova, Malinka
    Trifonova, Iskra
    Hristov, Martin
    PROCEEDINGS OF 2023 6TH ARTIFICIAL INTELLIGENCE AND CLOUD COMPUTING CONFERENCE, AICCC 2023, 2023, : 211 - 217
  • [3] K-Anonymization approach for privacy preservation using data perturbation techniques in data mining
    Kiran, Ajmeera
    Shirisha, N.
    MATERIALS TODAY-PROCEEDINGS, 2022, 64 : 578 - 584
  • [4] K-Anonymization approach for privacy preservation using data perturbation techniques in data mining
    Kiran, Ajmeera
    Shirisha, N.
    MATERIALS TODAY-PROCEEDINGS, 2022, 64 : 578 - 584
  • [5] Alpha-anonymization techniques for privacy preservation in social networks
    Chakraborty, Saptarshi
    Tripathy, B. K.
    SOCIAL NETWORK ANALYSIS AND MINING, 2016, 6 (01)
  • [6] Privacy Preservation in Social networks through alpha - anonymization techniques
    Chakraborty, Saptarshi
    Tripathy, B. K.
    PROCEEDINGS OF THE 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2015), 2015, : 1602 - 1603
  • [7] An Analysis of Privacy Preservation Techniques in Data Mining
    Sachan, Abhishek
    Roy, Devshri
    Arun, P., V
    ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, VOL 3, 2013, 178 : 119 - +
  • [8] Analysis of Data Anonymization Techniques
    Marques, Joana Ferreira
    Bernardino, Jorge
    PROCEEDINGS OF THE 12TH INTERNATIONAL JOINT CONFERENCE ON KNOWLEDGE DISCOVERY, KNOWLEDGE ENGINEERING AND KNOWLEDGE MANAGEMENT (KEOD), VOL 2, 2020, : 235 - 241
  • [9] Scalable Local-Recoding Anonymization using Locality Sensitive Hashing for Big Data Privacy Preservation
    Zhang, Xuyun
    Leckie, Christopher
    Dou, Wanchun
    Chen, Jinjun
    Kotagiri, Ramamohanarao
    Salcic, Zoran
    CIKM'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2016, : 1793 - 1802
  • [10] Clustering Based Anonymization For Privacy Preservation
    Ghate, Rashmi B.
    Ingle, Rasika
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,