CFP last date
20 December 2024
Reseach Article

Privacy Preserving Techniques on Centralized, Distributed and Social Network Data – A Review

by R. Padmaja, V. Santhi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 140 - Number 8
Year of Publication: 2016
Authors: R. Padmaja, V. Santhi
10.5120/ijca2016909430

R. Padmaja, V. Santhi . Privacy Preserving Techniques on Centralized, Distributed and Social Network Data – A Review. International Journal of Computer Applications. 140, 8 ( April 2016), 48-52. DOI=10.5120/ijca2016909430

@article{ 10.5120/ijca2016909430,
author = { R. Padmaja, V. Santhi },
title = { Privacy Preserving Techniques on Centralized, Distributed and Social Network Data – A Review },
journal = { International Journal of Computer Applications },
issue_date = { April 2016 },
volume = { 140 },
number = { 8 },
month = { April },
year = { 2016 },
issn = { 0975-8887 },
pages = { 48-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume140/number8/24618-2016909430/ },
doi = { 10.5120/ijca2016909430 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:41:46.039722+05:30
%A R. Padmaja
%A V. Santhi
%T Privacy Preserving Techniques on Centralized, Distributed and Social Network Data – A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 140
%N 8
%P 48-52
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Privacy Preserving Data Publishing refers publishing data in such a way that the privacy of the individuals are preserved. The Published data can further be used for various Data Analysis and Data Mining tasks. Techniques used to preserve privacy of individuals before publishing is called Anonymization Techniques. Initially only centralized data need to be published for analysis and Mining. Later with the advent of Internet, it has become necessary to publish Distributed and Social network data. The Anonymization Techniques that are applied on Centralized data can be applied on both Distributed and Social Network data with little modifications. This Paper is to present a brief review of Anonymization Techniques like k-anonymity and l-diversity on Centralized, Distributed and Social Network Data.

References
  1. Li N, Li T, Venkatasubramanian S (2007) t-Closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd international conference on data engineering (ICDE’07), IEEE, pp 106–115.
  2. G. T. Duncan and D. Lambert. Disclosure-limited data dissemination.J. Am. Stat. Assoc., pages 10–28, 1986.
  3. D. Lambert. Measures of disclosure risk and harm. J. OfficialStat., 9:313, 1993.
  4. P. Samarati. Protecting respondent’s privacy in microdata release. IEEE T. Knowl. Data En., 13(6):1010–1027, 2001.
  5. P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory, 1998.
  6. L. Sweeney. K-anonymity: A model for protecting privacy.Int. J. Uncertain. Fuzz., 10(5):557–570, 2002.
  7. A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. InProc. 22nd Intnl. Conf. Data Engg. (ICDE), page 24, 2006.
  8. Pawel Jurczyk, LiXiong, “Privacy Preserving Data Publishing for Horizontally Partitioned Databases”, In Proc. Of 17th ACM conference on Information and Knowledge management, ACM, New York, USA, Pages 1321-1322, 2008.
  9. Slawomir Goryczka, Li Xion, Benjamin C.M.Fung, “M-Privacy for Collaborative Data Publishing”, In Proc of 7th International Conference on Collaborative Computig:Networking, Applications and Worksharing, Orlando, FL,Pages:1-10,2011.
  10. B. Zhou, Jian Pei, Wo-Shun Luk, "A brief survey on anonymization techniques for privacy preserving publishing of social network data," ACM SIGKDD Explorations Newsletter, Vol. 10, pp. 12‐22, 2008.
  11. L. Sweeney, “k-Anonymity: A Model for Protecting Privacy,” Int’l J. Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002.(3,23).
  12. Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian, "t‐closeness: Privacy beyond k‐anonymity and l‐diversity," In Proc. of 23rd International Conference on Data Engineering ICDE 2007, IEEE, Istanbul, pp 106‐115, 2007.
  13. N. Mohammed, B. C. M. Fung, P. C. K. Hung, and C. Lee, “Centralized and distributed anonymization for high-dimensional healthcare data,” ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 4, no. 4, pp. 18:1–18:33, October 2010.(2,4).
  14. B.C.M. Fung, K. Wang, R. Chen, and P.S. Yu, “Privacy-Preserving Data Publishing: A Survey of Recent Developments,” ACM Computing Surveys, vol. 42, no. 4, pp. 1-53, 2010.(3,11).
  15. B.C.M. Fung, K. Wang, and P.S. Yu, “Anonymizing Classification Data for Privacy Preservation,” IEEE Trans. Knowledge and Data Eng., vol. 19, no. 5, pp. 711-725, May 2007.(3,12).
  16. K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Mondrian multidimensional k-anonymity. In Proceedings of the 22nd International Conference on Data Engineer ing (ICDE'06), page 25, Washington, DC, USA, 2006.IEEE Computer Society.
  17. B. C. M. Fung, K. Wang, and P. S. Yu. Anonymizing classication data for privacy preservation. IEEE Transactions on Knowledge and Data Engineering,19(5):711{725, 2007.
  18. P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information. In Proceedings of the 7th ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems (PODS'98), page 188, New York, NY, USA, 1998. ACM Press.
  19. B. Zhou and J. Pei. The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. 31 May 2010 © Springer-Verlag London Limited 2010
  20. B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In Proceedings of the 24th IEEE International Conference on Data Engineering (ICDE'08), pages 506 to 515, Cancun, Mexico, 2008. IEEE Computer Society.
Index Terms

Computer Science
Information Sciences

Keywords

SMC TTP