An improved set-valued data anonymization algorithm and generation of FP-tree

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Data anonymization techniques enable publication of detailed information, while providing the privacy of sensitive information in the data against a variety of attacks. Anonymized data describes a set of possible worlds that include the original data. Generalization and suppression have been the most commonly used techniques for achieving anonymization. Some algorithms to protect privacy in the publication of set-valued data were developed by Terrovitis et. al.,[1]. The concept of k-anonymity was introduced by Samarati and Sweeny [2], so that every tuple has at least (k-1) tuples identical with it. This concept was modified in [1] in order to introduce km -anonymity, to limit the effects of the data dimensionality. This approach depends upon generalisation instead of suppression.To handle this problem two heuristic algorithms; namely the DA- algorithm and the AA-algorithm were developed by them.These alogorithms provide near optimal solutions in many cases.In this paper,we improve DA such that undesirable duplicates are not generated and using a FP-growth we display the anonymized data.We illustrate through suitable examples,the efficiency of our proposed algorithm. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Tripathy, B. K., Manusha, G. V., & Mohisin, G. S. (2012). An improved set-valued data anonymization algorithm and generation of FP-tree. In Communications in Computer and Information Science (Vol. 292 CCIS, pp. 552–560). https://doi.org/10.1007/978-3-642-31686-9_64

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free