TY - JOUR
T1 - (p+, α, t)-anonymity technique against privacy attacks
AU - Sowmyarani, C. N.
AU - Gadad, Veena
AU - Dayananda, P.
N1 - Publisher Copyright:
Copyright © 2021, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
PY - 2021/4/1
Y1 - 2021/4/1
N2 - Privacy preservation is a major concern in current technology where enormous amounts of data are being collected and published for carrying out analysis. These data may contain sensitive information related to individual who owns them. If the data is published in their original form, they may lead to privacy disclosure which threats privacy requirements. Hence, the data should be anonymized before publishing so that it becomes challenging for intruders to obtain sensitive information by means of any privacy attack model. There are popular data anonymization techniques such as k-anonymity, l-diversity, p-sensitive k-anonymity, (l, m, d) anonymity, and t-closeness, which are vulnerable to different privacy attacks discussed in this paper. The proposed technique called (p+, α, t)-anonymity aims to anonymize the data in such a way that even though intruder has sufficient background knowledge on the target individual he will not be able to infer anything and breach private information. The anonymized data also provide sufficient data utility by allowing various data analytics to be performed.
AB - Privacy preservation is a major concern in current technology where enormous amounts of data are being collected and published for carrying out analysis. These data may contain sensitive information related to individual who owns them. If the data is published in their original form, they may lead to privacy disclosure which threats privacy requirements. Hence, the data should be anonymized before publishing so that it becomes challenging for intruders to obtain sensitive information by means of any privacy attack model. There are popular data anonymization techniques such as k-anonymity, l-diversity, p-sensitive k-anonymity, (l, m, d) anonymity, and t-closeness, which are vulnerable to different privacy attacks discussed in this paper. The proposed technique called (p+, α, t)-anonymity aims to anonymize the data in such a way that even though intruder has sufficient background knowledge on the target individual he will not be able to infer anything and breach private information. The anonymized data also provide sufficient data utility by allowing various data analytics to be performed.
UR - https://www.scopus.com/pages/publications/85104054469
UR - https://www.scopus.com/inward/citedby.url?scp=85104054469&partnerID=8YFLogxK
U2 - 10.4018/IJISP.2021040104
DO - 10.4018/IJISP.2021040104
M3 - Article
AN - SCOPUS:85104054469
SN - 1930-1650
VL - 15
SP - 68
EP - 86
JO - International Journal of Information Security and Privacy
JF - International Journal of Information Security and Privacy
IS - 2
ER -