Performance Analysis of Various Anonymization Techniques for Privacy Preservation of Sensitive Data

被引:0
|
作者
Sreevidya, B. [1 ]
Rajesh, M. [1 ]
Sasikala, T. [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Comp Sci & Engn, Bengaluru, India
关键词
Diversity; K-anonymity; T-closeness; Differential privacy; Slicing; Data utility;
D O I
10.1007/978-3-030-03146-6_77
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Various domains like health care, observing the life of the wild in the forest area, surveillance, etc. have started using the technologies like Wireless Sensor Networks (WSN). Internet of Things (IoT) is also another technology which is used in this regard. WSN based applications generate humungous data due to the continuous monitoring and data logging feature of WSN. This invokes the need to handle humungous magnitude of data and various Big Data frameworks help to handle it. Along with the management of huge amount of data, another issue to be handled is the management of sensitive data. The issue of protecting the secrecy of the data becomes an essentially important area for research. Most of the times, the challenge involved in handling sensitive data is the necessity that the data needs to be published to public media. There exists various problems in data publishing. The problem associated is to preserve the information that is confidential and delicate yet publish useful data. The concept of protecting the privacy of the data involves publishing data without allowing the unauthorized users to access sensitive information. The proposed work focuses on analysis of various techniques in privacy preservation of sensitive data and it is referred as Anonymization. The different anonymization techniques considered for analysis are t-closeness, differential privacy, slicing, k-anonymity and l-diversity. An experimental setup is developed and datasets from Google Financial is used to fractionate the execution of the various anonymization techniques.
引用
收藏
页码:687 / 693
页数:7
相关论文
共 50 条
  • [31] Managing dimensionality in data privacy anonymization
    Hessam Zakerzadeh
    Charu C. Aggarwal
    Ken Barker
    Knowledge and Information Systems, 2016, 49 : 341 - 373
  • [32] Interactive Anonymization of Sensitive Data
    Xiao, Xiaokui
    Wang, Guozhang
    Gehrke, Johannes
    ACM SIGMOD/PODS 2009 CONFERENCE, 2009, : 1051 - 1053
  • [33] Adaptive Privacy Preservation Approach for Big Data Publishing in Cloud using k-anonymization
    Madan S.
    Goswami P.
    Recent Advances in Computer Science and Communications, 2021, 14 (08) : 2678 - 2688
  • [34] Sensitive Attribute based Non-Homogeneous Anonymization for Privacy Preserving Data Mining
    Usha, P.
    Shriram, R.
    Sathishkumar, S.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [35] Privacy Preservation by k-Anonymization of Weighted Social Networks
    Skarkala, Maria E.
    Maragoudakis, Manolis
    Gritzalis, Stefanos
    Mitrou, Lilian
    Toivonen, Hannu
    Moen, Pirjo
    2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 423 - 428
  • [36] The K-Anonymization Method Satisfying Personalized Privacy Preservation
    Song, Jinling
    Huang, Liming
    Wang, Gang
    Kang, Yan
    Liu, Haibin
    IAEDS15: INTERNATIONAL CONFERENCE IN APPLIED ENGINEERING AND MANAGEMENT, 2015, 46 : 181 - 186
  • [37] Parallel privacy preservation through partitioning (P4): a scalable data anonymization algorithm for health data
    Halilovic, Mehmed
    Meurers, Thierry
    Otte, Karen
    Prasser, Fabian
    BMC MEDICAL INFORMATICS AND DECISION MAKING, 2025, 25 (01)
  • [38] Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data
    Yurcik, William
    Woolam, Clay
    Hellings, Greg
    Khan, Latifur
    Thuraisingham, Bhavani
    2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, : 991 - 994
  • [39] Satisfying Privacy Requirements Before Data Anonymization
    Sun, Xiaoxun
    Wang, Hua
    Li, Jiuyong
    Zhang, Yanchun
    COMPUTER JOURNAL, 2012, 55 (04): : 422 - 437
  • [40] Analysis of Location Monitoring Techniques with Privacy Preservation in WSN
    Dhawale, Shrikant P.
    Raut, Archana R.
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 649 - 653