A Review On Possible Attack In Privacy Model And Modification Technique

: In recent year, due to the development of data mining techniques a large amount of data is mined out to reveal potential useful information about user. This creates the problem of information leakage of user. So the goal of privacy preserving is to reveal the essential information without leaking of the sensitive information. In this paper, we study various privacy preserving models that preserve privacy when data from different data providers are integrated. Also we discussed various type of attacks that are possible in that models and take a review of various anonymization or modification methods that are used for preserving privacy.

[1]  Tzung-Pei Hong,et al.  Evolutionary privacy-preserving data mining , 2010, 2010 World Automation Congress.

[2]  Steven P. Reiss Practical Data-Swapping: The First Steps , 1980, 1980 IEEE Symposium on Security and Privacy.

[3]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[4]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[5]  Wei Tian,et al.  A Survey of Privacy Preserving Data Publishing using Generalization and Suppression , 2014 .

[6]  Roberto J. Bayardo,et al.  Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).

[7]  S. Reiss,et al.  Data-swapping: A technique for disclosure control , 1982 .

[8]  David J. DeWitt,et al.  Mondrian Multidimensional K-Anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[9]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[10]  David J. DeWitt,et al.  Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.

[11]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.