Improved algorithms for anonymization of set-valued data

2Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Data anonymization techniques enable publication of detailed information, while providing the privacy of sensitive information in the data against a variety of attacks. Anonymized data describes a set of possible worlds that include the original data. Generalization and suppression have been the most commonly used techniques for achieving anonymization. Some algorithms to protect privacy in the publication of set-valued data were developed by Terrovitis et al.,[16]. The concept of k-anonymity was introduced by Samarati and Sweeny [15], so that every tuple has at least (k-1) tuples identical with it. This concept was modified in [16] in order to introduce Km -anonymity, to limit the effects of the data dimensionality. This approach depends upon generalisation instead of suppression. To handle this problem two heuristic algorithms; namely the DA-algorithm and the AA-algorithm were developed by them.These alogorithms provide near optimal solutions in many cases.In this paper,we improve DA such that undesirable duplicates are not generated and using a FP-growth we display the anonymized data.We illustrate through suitable examples,the efficiency of our proposed algorithm. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Tripathy, B. K., Jayaram Reddy, A., Manusha, G. V., & Mohisin, G. S. (2013). Improved algorithms for anonymization of set-valued data. In Advances in Intelligent Systems and Computing (Vol. 177 AISC, pp. 581–594). Springer Verlag. https://doi.org/10.1007/978-3-642-31552-7_59

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free