Differential Privacy Preserving Algorithm For Data Anonymization

Presently a day the amplifying of data utilization and minimizing protection danger are two clashing objectives. The organization required arrangement of change at the time of discharge information. While deciding the best arrangement of changes has been the concentrate on the broad work in the database group, the scalability and security are significant issues while information change. The privacy preserving method called K-anonymity is acquainted with conquer this issue. In this procedure, every one of the data records are divided into some number of datasets and each record in a specific dataset must be vague with different records in that dataset. But, this technique is vulnerable to some attacks. Thus another method called l-diversity qualities is acquainted with keep away from foundation assaults on the anonymized information.

[1]  Nabil R. Adam,et al.  Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..

[2]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[3]  S. Reiss,et al.  Data-swapping: A technique for disclosure control , 1982 .

[4]  Alexandre V. Evfimievski,et al.  Limiting privacy breaches in privacy preserving data mining , 2003, PODS.

[5]  P. Diaconis,et al.  Algebraic algorithms for sampling from conditional distributions , 1998 .

[6]  Irit Dinur,et al.  Revealing information while preserving privacy , 2003, PODS.

[7]  Ramakrishnan Srikant,et al.  Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.

[8]  A. Dobra Statistical tools for disclosure limitation in multi-way contingency tables , 2002 .

[9]  George T. Duncan,et al.  Obtaining Information while Preserving Privacy: A Markov Perturbation Method for Tabular Data , 1997 .

[10]  Hoeteck Wee,et al.  Toward Privacy in Public Databases , 2005, TCC.

[11]  Nina Mishra,et al.  Simulatable auditing , 2005, PODS.

[12]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[13]  L. Cox Suppression Methodology and Statistical Disclosure Control , 1980 .

[14]  Joseph Y. Halpern,et al.  From Statistical Knowledge Bases to Degrees of Belief , 1996, Artif. Intell..

[15]  Dan Suciu,et al.  A formal analysis of information disclosure in data exchange , 2004, SIGMOD '04.

[16]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[17]  Philip S. Yu,et al.  A Condensation Approach to Privacy Preserving Data Mining , 2004, EDBT.