Visible to the public Investigation on Privacy Preserving using K-Anonymity Techniques

TitleInvestigation on Privacy Preserving using K-Anonymity Techniques
Publication TypeConference Paper
Year of Publication2020
AuthorsKumar, B. S., Daniya, T., Sathya, N., Cristin, R.
Conference Name2020 International Conference on Computer Communication and Informatics (ICCCI)
Date PublishedJan. 2020
ISBN Number978-1-7281-4514-3
Keywordsanonymity, component, composability, computing device pervasiveness, credit card information, cryptography, data encryption, data mining, data privacy, data repository, Human Behavior, k-anonymity, k-anonymity techniques, medical conditions, Metrics, online portals, person-identifiable information, personal information, Portals, privacy preserving, Privacy-preserving, pubcrawl, repository, resilience, Resiliency, UML

In the current world, day by day the data growth and the investigation about that information increased due to the pervasiveness of computing devices, but people are reluctant to share their information on online portals or surveys fearing safety because sensitive information such as credit card information, medical conditions and other personal information in the wrong hands can mean danger to the society. These days privacy preserving has become a setback for storing data in data repository so for that reason data in the repository should be made undistinguishable, data is encrypted while storing and later decrypted when needed for analysis purpose in data mining. While storing the raw data of the individuals it is important to remove person-identifiable information such as name, employee id. However, the other attributes pertaining to the person should be encrypted so the methodologies used to implement. These methodologies can make data in the repository secure and PPDM task can made easier.

Citation Keykumar_investigation_2020