An Extensive Study on Data Anonymization Algorithms Based on K-Anonymity

Show simple item record

dc.contributor.author Simi, MS
dc.contributor.author Nayaki, K Sankara
dc.contributor.author Elayidom, M Sudheep
dc.date.accessioned 2024-07-08T23:29:21Z
dc.date.available 2024-07-08T23:29:21Z
dc.date.issued 2017-08
dc.identifier.citation (2017). IOP Conference Series: Materials Science and Engineering, 225, 012279.
dc.identifier.issn 1757-8981
dc.identifier.uri https://hdl.handle.net/2292/68993
dc.description.abstract For business and research oriented works engaging Data Analysis and Cloud services needing qualitative data, many organizations release huge microdata. It excludes an individual's explicit identity marks like name, address and comprises of specific information like DOB, Pin-code, sex, marital status, which can be combined with other public data to recognize a person. This implication attack can be manipulated to acquire any sensitive information from social network platform, thereby putting the privacy of a person in grave danger. To prevent such attacks by modifying microdata, K-anonymization is used. With potentially increasing data, the effective method to anonymize it stands challenging. After series of trails and systematic comparison, in this paper, we propose three best algorithms along with its efficiency and effectiveness. Studies help researchers to identify the relationship between the values of k, degree of anonymization, choosing a quasi-identifier and focus on execution time.
dc.publisher IOP Publishing
dc.relation.ispartof IOP Conference Series: Materials Science and Engineering
dc.relation.ispartofseries IOP Conference Series: Materials Science and Engineering
dc.rights Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher.
dc.rights.uri https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm
dc.rights.uri https://creativecommons.org/licenses/by/4.0/
dc.title An Extensive Study on Data Anonymization Algorithms Based on K-Anonymity
dc.type Conference Item
dc.identifier.doi 10.1088/1757-899x/225/1/012279
pubs.begin-page 012279
pubs.volume 225
dc.date.updated 2024-06-25T06:07:23Z
dc.rights.holder Copyright: The authors en
pubs.author-url https://iopscience.iop.org/article/10.1088/1757-899X/225/1/012279/meta
pubs.end-page 012279
pubs.publication-status Published
dc.rights.accessrights http://purl.org/eprint/accessRights/OpenAccess en
pubs.subtype Conference Paper
pubs.elements-id 1034210
pubs.org-id Medical and Health Sciences
pubs.org-id Medical Sciences
dc.identifier.eissn 1757-899X
pubs.record-created-at-source-date 2024-06-25
pubs.online-publication-date 2017-09-05


Files in this item

Find Full text

This item appears in the following Collection(s)

Show simple item record

Share

Search ResearchSpace


Browse

Statistics