A Comparative Study of Data Anonymization Techniques

In today's digital era, it is a very common practice for organizations to collect data from individual users. The collected data is then stored in multiple databases which contain personally identifiable information (PII). This may lead to a major source of privacy risk for the database. Various privacy preservation techniques have been proposed such as perturbation, anonymization and cryptographic. In this study, five anonymization techniques are compared using the same dataset. In addition to that, this study reviews the strengths and weaknesses of the different technique. In the evaluation of efficiency, suppression is found as the most efficient while swapping is in the last place. It is also revealed that swapping is the most resource-consuming technique while suppressing being less resource consuming.

[1]  Yücel Saygin,et al.  Privacy-Preserving Publishing of Hierarchical Data , 2016, ACM Trans. Priv. Secur..

[2]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[3]  Jaap-Henk Hoepman,et al.  PDF hosted at the Radboud Repository of the Radboud University Nijmegen , 2022 .

[4]  Kshitij Pathak,et al.  K-anonymity Model for Multiple Sensitive Attributes , 2012 .

[5]  Lei Yang,et al.  Privacy-preserving data sharing in Smart Grid systems , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[6]  Pedro Rijo,et al.  Evaluating the Impact of Anonymization on Large Interaction Network Datasets , 2014, PSBD '14.

[7]  Atul Kumar,et al.  A comparative review of privacy preservation techniques in data publishing , 2018, 2018 2nd International Conference on Inventive Systems and Control (ICISC).

[8]  Harsh Kupwade Patil,et al.  Big Data Security and Privacy Issues in Healthcare , 2014, 2014 IEEE International Congress on Big Data.

[9]  Jing Yang,et al.  Research on Privacy Protection Based on K-Anonymity , 2010, 2010 International Conference on Biomedical Engineering and Computer Science.

[10]  Journal Ijmer,et al.  A Comparative Study on Privacy Preserving Datamining Techniques , 2014 .

[11]  Roslan Ismail,et al.  Privacy Preserving Technique for Smart Metering Data: A Preliminary Result , 2018 .

[12]  Georgios Kalogridis,et al.  Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[13]  Chong K. Liew,et al.  A data distortion by probability distribution , 1985, TODS.

[14]  Jordi Nin,et al.  Privacy and anonymization for very large datasets , 2009, CIKM.

[15]  E. Poovammal,et al.  APPT: A privacy preserving transformation tool for micro data release , 2010, A2CWiC '10.