Title :
Analysis of privacy preserving K-anonymity methods and techniques
Author :
Vijayarani, S. ; Tamilarasi, A. ; Sampoorna, M.
Author_Institution :
Sch. of Comput. Sci. & Eng., Bharathiar Univ., Coimbatore, India
Abstract :
Many applications employing the data mining techniques involve mining the data that includes private and sensitive information about the subjects. K-anonymity is a property that models the protection of released data against possible re-identification of the respondents to which the data refers. One of the interesting aspects of k-anonymity is its association with protection techniques that preserve the truthfulness of the data. It is however evident that the collection and analysis of data that include personal information may violate the privacy of the individuals to whom information refers. To guarantee the k-anonymity requirement, k-anonymity requires each quasi-identifier value in the released table to have at least k occurrences. In this paper, we present a survey of recent approaches that have been applied to the k-Anonymity problem.
Keywords :
data mining; data privacy; data mining technique; data protection techniques; personal information privacy; privacy preserving K-anonymity method; Algorithm design and analysis; Data models; Data privacy; Databases; Joining processes; Medical diagnostic imaging; Data Mining; K-Anonymity; Privacy;
Conference_Titel :
Communication and Computational Intelligence (INCOCCI), 2010 International Conference on
Conference_Location :
Erode