K-anonymity model is mostly used technique of privacy preserving data publishing. In K-anonymity model data is converted into anonymous state. So, that adversary can’t be able to disclose sensitive information about the user. Generalization and suppression are most commonly used anonymity technique, but generalization contains some drawbacks i.e. generalization disturbs correlations between attributes. In this paper a novel model is proposed which uses generalization technique specially to maintain correlation among overlapped attributes and way to reduce dimensionality of data set. Experimental evaluation section shows efficiency and correctness of proposed model
Abstract—The k-anonymization method is a commonly used privacy-preserving technique. Previous studie...
The prevalent conditions in data sharing and mining have necessitated the release and ...
Most of the recent efforts addressing the issue of privacy have focused on devising algorithms for t...
Preserving privacy while publishing data has emerged as key research area in data security and has b...
In today‟s era acquiring information about others is not difficult task but securing this data form ...
k-Anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-a...
k-anonymity is the method used for masking sensitive data which successfully solves the problem of r...
Numerous privacy models based on the k-anonymity property and extending the k-anonymity model have b...
Many applications that employ data mining techniques involve mining data that include private and se...
In order to support the increasing need to share electronic health data for research purposes, vario...
AbstractBasing on the study of K-Anonymity algorithm in privacy protection issue, this paper propose...
Often a data holder, such as a hospital or bank, needs to share person-specific records in such a wa...
Data mining provides tools to convert a large amount of knowledge data which is user relevant. But t...
Disclosure-control is a traditional statistical methodology for protecting pri-vacy when data is rel...
Many organisations are releasing microdata everyday for business and research purposes. This data do...
Abstract—The k-anonymization method is a commonly used privacy-preserving technique. Previous studie...
The prevalent conditions in data sharing and mining have necessitated the release and ...
Most of the recent efforts addressing the issue of privacy have focused on devising algorithms for t...
Preserving privacy while publishing data has emerged as key research area in data security and has b...
In today‟s era acquiring information about others is not difficult task but securing this data form ...
k-Anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-a...
k-anonymity is the method used for masking sensitive data which successfully solves the problem of r...
Numerous privacy models based on the k-anonymity property and extending the k-anonymity model have b...
Many applications that employ data mining techniques involve mining data that include private and se...
In order to support the increasing need to share electronic health data for research purposes, vario...
AbstractBasing on the study of K-Anonymity algorithm in privacy protection issue, this paper propose...
Often a data holder, such as a hospital or bank, needs to share person-specific records in such a wa...
Data mining provides tools to convert a large amount of knowledge data which is user relevant. But t...
Disclosure-control is a traditional statistical methodology for protecting pri-vacy when data is rel...
Many organisations are releasing microdata everyday for business and research purposes. This data do...
Abstract—The k-anonymization method is a commonly used privacy-preserving technique. Previous studie...
The prevalent conditions in data sharing and mining have necessitated the release and ...
Most of the recent efforts addressing the issue of privacy have focused on devising algorithms for t...