Hiindex LOGO

Research Article

Protecting Privacy When Disclosing Information: K Anonymity And Its Enforcement Through Suppression


Author(s): V.Khanaa , K.P.Thooyamani
Affiliation: Dean, Centre for Information, Bharath University, Chennai
Year of Publication: 2012
Source: International Journal of Computing Algorithm
     
×

Scholarly Article Identity Link


HTML:


File:


Citation: V.Khanaa, K.P.Thooyamani. "Protecting Privacy When Disclosing Information: K Anonymity And Its Enforcement Through Suppression." International Journal of Computing Algorithm 1.1 (2012): 19-22.

Abstract:
Anonymization means to remove personal identifier or converted into non readable form by human to protect private or personal information. Data anonymization can be performed in different ways but in this paper k-anonymization approach is used. Suppose one person A having his own kanonymous database and needs to determine whether database is still k-anonymous if tuple inserted by another person B. For some applications for example, Student’s record, database needs to be confidential, So access to the database is strictly controlled. The confidentiality of the database managed by the owner is violated once others have access to the contents of the database.


Keywords Anonymization,FERPA


  • BibTex
  • Reference
  • XML
  • JSON
  • Dublin Core
  • CSL

@article{Pro1293912, author = {V.Khanaa,K.P.Thooyamani}, title = {Protecting Privacy When Disclosing Information: K Anonymity And Its Enforcement Through Suppression}, journal={International Journal of Computing Algorithm}, volume={1}, issue={1}, issn = {2278-2397}, year = {2012}, publisher = {Scholarly Citation Index Analytics-SCIA}

  • [1] U.S. Department of Education. General Family Educational Rights and privacy Act FERPA.
  • [2] B.C.M. Fung ,K. Wang, A.W.C. Fu and J. Pei, Anonymity for Continuous Data Publishing Proc. Extending database Technology Conference EDBT,2008
  • [3] M.K.Reiter, A. Rubin. Crowds: anonymity with Web transctions.ACM Transactions on Information and System Security TISSEC,11,1998;66-92
  • [4] P. Samarati. Protecting respondent’s privacy in micro data release, IEEE Transactions on Knowledge and Data Engineering vol. 13,no. 6,pp.1010- 1027,Nov/Des.2001
  • [5] University of Miami Leonard M.Miller School of Medicine, Information Technology.
  • [6] Dr. Durgesh Kumar Mishra, Neha Koria, Nikhil Kapoor, Ravish Bahety ,A Secure Multi-Party Computation Protocol for Malicious Computation Prevention for preserving privacy during Data Mining, Vol. 3,No. 1,2009
  • <?xml version='1.0' encoding='UTF-8'?> <record> <language>eng</language> <journalTitle>International Journal of Computing Algorithm</journalTitle> <eissn>2278-2397 </eissn> <publicationDate>2012</publicationDate> <volume>1</volume> <issue>1</issue> <startPage>19</startPage> <endPage>22</endPage> <documentType>article</documentType> <title language='eng'>Protecting Privacy When Disclosing Information: K Anonymity And Its Enforcement Through Suppression</title> <authors> <author> <name>V.Khanaa</name> </author> </authors> <abstract language='eng'>Anonymization means to remove personal identifier or converted into non readable form by human to protect private or personal information. Data anonymization can be performed in different ways but in this paper k-anonymization approach is used. Suppose one person A having his own kanonymous database and needs to determine whether database is still k-anonymous if tuple inserted by another person B. For some applications for example, Student’s record, database needs to be confidential, So access to the database is strictly controlled. The confidentiality of the database managed by the owner is violated once others have access to the contents of the database.</abstract> <fullTextUrl format='pdf'>http://www.hindex.org/2012/p939.pdf</fullTextUrl> <keywords language='eng'> <keyword>Anonymization,FERPA</keyword> </keywords> </record>

    { "@context":"http://schema.org", "@type":"publication-article","identifier":"http://www.hindex.org/2012/article.php?page=939", "name":"Protecting Privacy When Disclosing Information: K Anonymity And Its Enforcement Through Suppression", "author":[{"name":"V.Khanaa "}], "datePublished":"2012", "description":"Anonymization means to remove personal identifier or converted into non readable form by human to protect private or personal information. Data anonymization can be performed in different ways but in this paper k-anonymization approach is used. Suppose one person A having his own kanonymous database and needs to determine whether database is still k-anonymous if tuple inserted by another person B. For some applications for example, Student’s record, database needs to be confidential, So access to the database is strictly controlled. The confidentiality of the database managed by the owner is violated once others have access to the contents of the database.", "keywords":["Anonymization,FERPA"], "schemaVersion":"https://schema.org/version/3.3", "includedInDataCatalog":{ "@type":"DataCatalog", "name":"Scholarly Citation Index Analytics-SCIA", "url":"http://hindex.org"}, "publisher":{"@type":"Organization", "name":"Scientific Communications Research Academy" } }

    <?xml version='1.0' encoding='utf-8'?> <oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"> <dc:contributor>K.P.Thooyamani</dc:contributor> <dc:contributor></dc:contributor> <dc:contributor></dc:contributor> <dc:creator>V.Khanaa</dc:creator> <dc:date>2012</dc:date> <dc:description>Anonymization means to remove personal identifier or converted into non readable form by human to protect private or personal information. Data anonymization can be performed in different ways but in this paper k-anonymization approach is used. Suppose one person A having his own kanonymous database and needs to determine whether database is still k-anonymous if tuple inserted by another person B. For some applications for example, Student’s record, database needs to be confidential, So access to the database is strictly controlled. The confidentiality of the database managed by the owner is violated once others have access to the contents of the database.</dc:description> <dc:identifier>2012SCIA316F0939</dc:identifier> <dc:language>eng</dc:language> <dc:title>Protecting Privacy When Disclosing Information: K Anonymity And Its Enforcement Through Suppression</dc:title> <dc:type>publication-article</dc:type> </oai_dc:dc>

    { "identifier": "2012SCIA316F0939", "abstract": "Anonymization means to remove personal identifier or converted into non readable form by human to protect private or personal information. Data anonymization can be performed in different ways but in this paper k-anonymization approach is used. Suppose one person A having his own kanonymous database and needs to determine whether database is still k-anonymous if tuple inserted by another person B. For some applications for example, Student’s record, database needs to be confidential, So access to the database is strictly controlled. The confidentiality of the database managed by the owner is violated once others have access to the contents of the database.", "author": [ { "family": "V.Khanaa,K.P.Thooyamani" } ], "id": "939", "issued": { "date-parts": [ [ 2012 ] ] }, "language": "eng", "publisher": "Scholarly Citation Index Analytics-SCIA", "title": " Protecting Privacy When Disclosing Information: K Anonymity And Its Enforcement Through Suppression", "type": "publication-article", "version": "3" }