Secure Techniques of Data Anonymization for Privacy Preservation

Disha Dubli


Abstract: Now a day's there is an extensive use of internet , the data present on it should be made available in a way that an individual's privacy is not affected. Recently, many organizations are accumulating gigantic amounts of data which are stored in huge databases. Data publisher gather data from data holders, and publicize this data to data recipient for mining, statistical analysis etc. The released data can reveal secret information of an individual. For providing security to the data, many anonymization techniques have been designed for privacy preserving and micro data publishing. This paper discusses various anonymization techniques such as generalization, bucketization, slicing and also provide a methodology for enhancing security in the slicing technique. Further, a comparative analysis of the proposed method with existing techniques is discussed.


data publishing, data security, data anonymization, privacy preservation, generalization, bucketization, slicing

Full Text:



P. Samarati and L. Sweeney, “Protecting privacy when disclosing information:-anonymity and its enforcement through generalization and suppression,” SRI International, SRI-CSL-98-04, 1998

L. Sweeney, “K-Anonymity: A model for protecting privacy,” International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10, no. 5, pp. 557–570, 2002.

M. Barbaro and T. Zeller, “A face is exposed for AOL searcher no. 4417749,” New York Times, 2006.

G. T. Duncan and D. Lambert, “Disclosure-limited data dissemination,” Journal of The American Statistical Association, pp. 10–28, 1986.

D. Lambert, “Measures of disclosure risk and harm,” Journal of Official Statistics, vol. 9, pp. 313–331, 1993.

M. E. Nergiz, M. Atzori, and C. Clifton, “Hiding the presence of individuals from shared databases,” in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), pp. 665–676, 2007

X. Xiao and Y. Tao, “Anatomy: Simple and Effective Privacy Preservation,” Proc. Int‟l Conf. Very Large Data Bases (VLDB), pp. 139-150, 2006.

H. Kargupta, S. Datta, Q.Wang, and K. Sivakumar, “On the privacy preserving properties of random data perturbation techniques,” in Proceedings of the International Conference on Data Mining (ICDM), p. 99, 2003.

Tiancheng Li, Ninghui Li, “Slicing: A New Approach for Privacy Preserving Data Publishing” IEEE Transactions On Knowledge And Data Engineering, Vol. 24, No. 3, March 2012

M. Terrovitis, N. Mamoulis, and P. Kalnis, “Privacy-Preserving Anonymization of Set-Valued Data,” Proc. Int’l Conf. Very Large Data Bases (VLDB), pp. 115-125, 2008.

Y. Xu, K. Wang, A.W.-C. Fu, and P.S. Yu, “Anonymizing Transaction Databases for Publication,” Proc. ACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining (KDD), pp. 767-775, 2008.



  • There are currently no refbacks.

Copyright (c) 2017 International Journal of Advanced Research in Computer Science