A Novel Approach Of Privacy Preserving Data With Anonymizing Tree Structure

E. Lohitha, Khaleelullah . Shaik

Abstract


Data anonymization techniques have been proposed in order to allow processing of personal data without compromising user’s privacy. the data management community is facing a big challenge to protect personal information of individuals from attackers who try to disclose the information. So data anonymization strategies have been proposed so as to permit handling of individual information without compromising user’s privacy. Data anonymization is a type of information sanitization whose intent is privacy protection. It is the process of either encrypting or removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous. We are presenting k(m;n)-anonymity privacy guarantee which addresses background knowledge of both value and structure using improved and automatic greedy algorithm. (k (m,n) - obscurity ensure) A tree database D is considered k (m,n) - unknown if any assailant who has foundation information of m hub names and n auxiliary relations between them (ancestor descendant), is not ready to utilize this learning to distinguish not as much as k records in D. A tree dataset D can be transformed to a dataset D0 which complies to k (m,n) - anonymity, by a series of transformations.The key idea is to replace rare values with a common generalized value and to remove ancestor descendant relations when they might lead to privacy breaches.

References


Australian Privacy Act. www.austlii.edu.au/au/legis/cth/consol act/pa1988108.

Canadian Privacy Act. laws-lois.justice.gc.ca/eng/acts/P-21/.

Data Protection Act 1998, UK. www.legislation.gov.uk/ukpga/1998/29/contents.

GR Law. www.dpa.gr/portal/page? pageid=33,43560& dad=portal.

M. Nergiz, C. Clifton, and A. Nergiz. Multirelational k-anonymity. IEEE TKDE, pages 104–1117, 2009.

M. Terrovitis, N. Mamoulis, and P. Kalnis. Privacy- preserving Anonymization of Set-valued Data. PVLDB, 1(1), 2008.

M. Terrovitis, N. Mamoulis, and P. Kalnis. Local and global recoding methods for anonymizing set-valued data. The VLDB Journal, 2010.

R. Chaytor and K. Wang. Small-domain randomization: Same privacy more utility. In VLDB, 2010.

R. Chen, N. Mohammed, B. C. M. Fung, B. C. Desai, and L. Xiong. Publishing set-valued data via differential privacy. PVLDB,4(11):1087–1098, 2011.

J. Cheng, A.W.-c. Fu, and J. Liu. K-isomorphism: privacy preserving network publication against structural attacks. In SIGMOD, 2010.

G. Cormode , Personal privacy vs population privacy: learning to attack anonymization.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.