{"title":"基于泛化的k -匿名化算法的评价","authors":"Devyani Patil, R. Mohapatra, Korra Sathya Babu","doi":"10.1109/SSPS.2017.8071586","DOIUrl":null,"url":null,"abstract":"The Electronic-Era has brought the major challenge to the individual's privacy by collecting the individual's information. This information is a threat to the privacy as it is published to the third party for the purpose of either research or study. Even though the identity is not published, based on some informative attributes and publicly available data, fraudulent can access the information which is supposed to be private. As a result, many researchers are attracted towards the challenge and developed many solutions. This paper is aimed to give comparative evolution of the various generalization hierarchy based K-anonymization algorithms. Major challenge while preserving the privacy of an individual, is to keep published data useful for the further research and analysis. Also, the data generated is voluminous and it should take less amount of time for anonymization. In this work these algorithms are compared for efficiency (in terms of time) and utility loss.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Evaluation of generalization based K-anonymization algorithms\",\"authors\":\"Devyani Patil, R. Mohapatra, Korra Sathya Babu\",\"doi\":\"10.1109/SSPS.2017.8071586\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Electronic-Era has brought the major challenge to the individual's privacy by collecting the individual's information. This information is a threat to the privacy as it is published to the third party for the purpose of either research or study. Even though the identity is not published, based on some informative attributes and publicly available data, fraudulent can access the information which is supposed to be private. As a result, many researchers are attracted towards the challenge and developed many solutions. This paper is aimed to give comparative evolution of the various generalization hierarchy based K-anonymization algorithms. Major challenge while preserving the privacy of an individual, is to keep published data useful for the further research and analysis. Also, the data generated is voluminous and it should take less amount of time for anonymization. In this work these algorithms are compared for efficiency (in terms of time) and utility loss.\",\"PeriodicalId\":382353,\"journal\":{\"name\":\"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SSPS.2017.8071586\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSPS.2017.8071586","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Evaluation of generalization based K-anonymization algorithms
The Electronic-Era has brought the major challenge to the individual's privacy by collecting the individual's information. This information is a threat to the privacy as it is published to the third party for the purpose of either research or study. Even though the identity is not published, based on some informative attributes and publicly available data, fraudulent can access the information which is supposed to be private. As a result, many researchers are attracted towards the challenge and developed many solutions. This paper is aimed to give comparative evolution of the various generalization hierarchy based K-anonymization algorithms. Major challenge while preserving the privacy of an individual, is to keep published data useful for the further research and analysis. Also, the data generated is voluminous and it should take less amount of time for anonymization. In this work these algorithms are compared for efficiency (in terms of time) and utility loss.