Full Paper View Go Back

Data Anonymization Techniques for Preserving Privacy in Public Release Data Model: A Technical Review

Arun Amaithi Rajan1 , Anitha Amaithi Rajan2

Section:Review Paper, Product Type: Journal-Paper
Vol.8 , Issue.1 , pp.58-62, Feb-2020


Online published on Feb 28, 2020


Copyright © Arun Amaithi Rajan, Anitha Amaithi Rajan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Arun Amaithi Rajan, Anitha Amaithi Rajan, “Data Anonymization Techniques for Preserving Privacy in Public Release Data Model: A Technical Review,” International Journal of Scientific Research in Computer Science and Engineering, Vol.8, Issue.1, pp.58-62, 2020.

MLA Style Citation: Arun Amaithi Rajan, Anitha Amaithi Rajan "Data Anonymization Techniques for Preserving Privacy in Public Release Data Model: A Technical Review." International Journal of Scientific Research in Computer Science and Engineering 8.1 (2020): 58-62.

APA Style Citation: Arun Amaithi Rajan, Anitha Amaithi Rajan, (2020). Data Anonymization Techniques for Preserving Privacy in Public Release Data Model: A Technical Review. International Journal of Scientific Research in Computer Science and Engineering, 8(1), 58-62.

BibTex Style Citation:
@article{Rajan_2020,
author = {Arun Amaithi Rajan, Anitha Amaithi Rajan},
title = {Data Anonymization Techniques for Preserving Privacy in Public Release Data Model: A Technical Review},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {2 2020},
volume = {8},
Issue = {1},
month = {2},
year = {2020},
issn = {2347-2693},
pages = {58-62},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1692},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1692
TI - Data Anonymization Techniques for Preserving Privacy in Public Release Data Model: A Technical Review
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Arun Amaithi Rajan, Anitha Amaithi Rajan
PY - 2020
DA - 2020/02/28
PB - IJCSE, Indore, INDIA
SP - 58-62
IS - 1
VL - 8
SN - 2347-2693
ER -

365 Views    561 Downloads    76 Downloads
  
  

Abstract :
The protection of sensitive records is very necessary for a modern scenario. Lately, the informational index is accessible for open use for statistical analysis. In this situation increasingly sensitive information like medical records, nation resident`s data, worker`s compensation data and so on are affecting to a higher extent since we are giving our data to people in general. Thus, Data anonymization assumes significance in the present day to protect the open discharge of sensitive information. In this paper, we reviewed some anonymization techniques and proposed a simple anonymization technique which is the combination of synthetic data generation and pseudonymization approach which reduces attacks on sensitive facts.

Key-Words / Index Term :
Anonymization techniques, privacy-preserving algorithm, synthetic data generation and pseudonymization technique

References :
[1] H. Kargupta, S. Datta, Q.Wang, and K. Sivakumar, “On the Privacy Preserving Properties of Random Data Perturbation Techniques,” In Proceedings of the International Conference on Data Mining (ICDM), pp. 99-106, 2003.
[2] Kavita Rodiya and Parmeet Gill, “A Review on Anonymization Techniques for privacy preserving data publishing,” IJRET: International Journal of Research in Engineering and Technology, November 2015.
[3] Disha Dubli and D.K Yadav, “Secure Techniques of Data Anonymization for Privacy Preservation,” International Journal of Advanced Research in Computer Science, Vol. 8, Issue. 05, pp. 1694-1698, 2017.
[4] Surendra .H, Dr. Mohan .H .S, “A Review of Synthetic Data Generation Methods for Privacy Preserving Data Publishing,” International Journal of Scientific & Technology Research, Vol. 6, Issue. 03, pp. 95-101, March 2017.
[5] White Paper on Pseudonymization Drafted by the Data Protection Focus Group for the Safety, Protection, and Trust Platform for Society and Businesses in Connection with the 2017 Digital Summit.
[6] Ajayi, Olusola Olajide, Adebiyi, Temidayo Olarewaju, “Application of Data Masking in Achieving Information Privacy,” IOSR Journal of Engineering (IOSRJEN), Vol. 04, Issue. 02, pp. 13-21, 2014.
[7] Thakkar A., Bhatti A.A., Vasa J., “Correlation Based Anonymization Using Generalization and Suppression for Disclosure Problems,” In Advances in Intelligent Informatics. Advances in Intelligent Systems and Computing, Vol. 320, pp. 581-592, 2015.
[8] Yang Xu, Tinghuai Ma, Meili Tang and Wei Tian, “A Survey of Privacy Preserving Data Publishing using Generalization and Suppression,” Applied Mathematics & Information Sciences. Vol. 8, Issue. 03, pp. 1103-1116, 2014.
[9] Anisha Tiwari1, Minu Choudhary, “A Review on K-Anonymization Techniques,” Scholars Journal of Engineering and Technology (SJET), Vol. 5, Issue. 06, pp. 238-245, 2017.
[10] Tanashri Karle and Prof Deepali Vora, “Privacy Preservation in Big Data Using Anonymization Techniques,” In International Conference on Data Management Analytics and Innovation (ICDMAI), pp. 340-343, 2017.
[11] Ramesh Bandaru , Rao S Basavala "Information Leakage through Social Networking Websites leads to Lack of Privacy and Identity Theft Security Issues." International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE), Vol 1, Issue. 03, pp. 1-7, 2013.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation