Preserving privacy while publishing data has emerged as key research area in data security and has become a primary issue in publishing person specific sensitive information. How to preserve one's privacy efficiently is a critical issue while publishing data. K-anonymity is a key technique for de-identifying the sensitive datasets. In our work, we have described a framework to implement most of the k-anonymity algorithms and also proposed a novel scheme that produces better results with real-world datasets. Additionally, we suggest a new approach that attains better results by applying a novel approach and exploiting various characteristic of our suggested framework. The proposed approach uses the concept of breadth- search algorithm to gen...
k-anonymity is the method used for masking sensitive data which successfully solves the problem of r...
In data publishing, privacy and utility are essential for data owners and users respectively, which ...
Syntactic data anonymization strives to (i) ensure that an adversary cannot identify an individual’s...
Preserving privacy while publishing data has emerged as key research area in data security and has b...
AbstractBasing on the study of K-Anonymity algorithm in privacy protection issue, this paper propose...
Most of the recent efforts addressing the issue of privacy have focused on devising algorithms for t...
K-anonymity model is mostly used technique of privacy preserving data publishing. In K-anonymity mod...
Many organisations are releasing microdata everyday for business and research purposes. This data do...
Many applications that employ data mining techniques involve mining data that include private and se...
A number of organizations publish microdata for purposes such as public health and demographic resea...
Open Science movement has enabled extensive knowledge sharing by making research publications, softw...
When releasing microdata for research purposes, one needs to preserve the privacy of re-spondents wh...
A number of organizations publish microdata for purposes such as public health and demographic resea...
Driven by mutual benefits, exchange and publication of data among various parties is an inevitable t...
Data publising is becoming popular because of its usage and application in many fields. But original...
k-anonymity is the method used for masking sensitive data which successfully solves the problem of r...
In data publishing, privacy and utility are essential for data owners and users respectively, which ...
Syntactic data anonymization strives to (i) ensure that an adversary cannot identify an individual’s...
Preserving privacy while publishing data has emerged as key research area in data security and has b...
AbstractBasing on the study of K-Anonymity algorithm in privacy protection issue, this paper propose...
Most of the recent efforts addressing the issue of privacy have focused on devising algorithms for t...
K-anonymity model is mostly used technique of privacy preserving data publishing. In K-anonymity mod...
Many organisations are releasing microdata everyday for business and research purposes. This data do...
Many applications that employ data mining techniques involve mining data that include private and se...
A number of organizations publish microdata for purposes such as public health and demographic resea...
Open Science movement has enabled extensive knowledge sharing by making research publications, softw...
When releasing microdata for research purposes, one needs to preserve the privacy of re-spondents wh...
A number of organizations publish microdata for purposes such as public health and demographic resea...
Driven by mutual benefits, exchange and publication of data among various parties is an inevitable t...
Data publising is becoming popular because of its usage and application in many fields. But original...
k-anonymity is the method used for masking sensitive data which successfully solves the problem of r...
In data publishing, privacy and utility are essential for data owners and users respectively, which ...
Syntactic data anonymization strives to (i) ensure that an adversary cannot identify an individual’s...