A Review of Privacy Preservation Technique

Privacy-preserving is one of the most important challenges in a computer world, because of the huge amount of sensitive information on the internet. The paper contains several privacy preservation techniques for data publishing in the real world. There are several privacy attacks are associate but among of them mainly two attacks are record linkage and attribute linkage. Many scientists have proposed methods to preserve the privacy of data publishing such as K-anonymity, l-diversity, t-closeness. K-anonymity can prevent the record linkage but unable to protect attribute linkage. l-diversity technique overcomes the drawback of k-anonymity technique but it fail to protect from membership discloser attack. Tcloseness technique prevents to attribute discloser attack but it fail in identity disclosure attack. Its computational complexity is large. In this paper we present the novel technique call slicing which to be implemented with various data set through prevent the privacy preservation for data publishing. The goals of this paper is re-analysis a number of privacy preservation of data mining technique clearly and then study the advantages and disadvantages of this technique.

[1]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[2]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[3]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[4]  Girish Agarwal,et al.  A Review On Data Anonymization Technique For Data Publishing , 2012 .

[5]  Ninghui Li,et al.  Slicing: A New Approach for Privacy Preserving Data Publishing , 2009, IEEE Transactions on Knowledge and Data Engineering.

[6]  T. Meyyappan,et al.  High Dimensional Data Handling Technique Using Overlapping Slicing Method for Privacy Preservation , 2013 .

[7]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[8]  Amardeep Singh,et al.  A Review of Privacy Preserving Data Publishing Technique , 2013 .

[9]  T. Meyyappan,et al.  Anonymization technique through record elimination to preserve privacy of published data , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.

[11]  Benjamin C. M. Fung,et al.  Privacy-preserving data publishing , 2007 .

[12]  Jian Pei,et al.  A brief survey on anonymization techniques for privacy preserving publishing of social network data , 2008, SKDD.

[13]  Pragati Patil,et al.  Privacy Preserving for High-dimensional Data using Anonymization Technique , 2013 .

[14]  Yuen-Tak Yu,et al.  A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions , 2006, J. Syst. Softw..