{"title":"PRIVACY preservation in big data using anonymization techniques","authors":"Tanashri Karle, D. Vora","doi":"10.1109/ICDMAI.2017.8073538","DOIUrl":null,"url":null,"abstract":"In todays world each individual wish that his private information is not revealed in some or the other way. Privacy preservation plays a vital role in preventing individual private data preserved from the praying eyes. Anonymization techniques enable publication of information which permit analysis and guarantee privacy of sensitive information in data against variety of attacks. It sanitizes the information. It can also keep the person anonymous using encryption technique. There are various anonymization techniques and algorithms available which are discussed in this paper. Paper focuses on Generalization and Suppression techniques and describes Datafly and Mondrian algorithm and also discusses their comparison.","PeriodicalId":368507,"journal":{"name":"2017 International Conference on Data Management, Analytics and Innovation (ICDMAI)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Data Management, Analytics and Innovation (ICDMAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDMAI.2017.8073538","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 20
Abstract
In todays world each individual wish that his private information is not revealed in some or the other way. Privacy preservation plays a vital role in preventing individual private data preserved from the praying eyes. Anonymization techniques enable publication of information which permit analysis and guarantee privacy of sensitive information in data against variety of attacks. It sanitizes the information. It can also keep the person anonymous using encryption technique. There are various anonymization techniques and algorithms available which are discussed in this paper. Paper focuses on Generalization and Suppression techniques and describes Datafly and Mondrian algorithm and also discusses their comparison.