International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 151 - Issue 9 |
Published: Oct 2016 |
Authors: Keerthy C., Sabitha S. |
![]() |
Keerthy C., Sabitha S. . Privacy Preserved Data Publishing Techniques for Tabular Data. International Journal of Computer Applications. 151, 9 (Oct 2016), 1-6. DOI=10.5120/ijca2016911874
@article{ 10.5120/ijca2016911874, author = { Keerthy C.,Sabitha S. }, title = { Privacy Preserved Data Publishing Techniques for Tabular Data }, journal = { International Journal of Computer Applications }, year = { 2016 }, volume = { 151 }, number = { 9 }, pages = { 1-6 }, doi = { 10.5120/ijca2016911874 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2016 %A Keerthy C. %A Sabitha S. %T Privacy Preserved Data Publishing Techniques for Tabular Data%T %J International Journal of Computer Applications %V 151 %N 9 %P 1-6 %R 10.5120/ijca2016911874 %I Foundation of Computer Science (FCS), NY, USA
Almost all countries have imposed strict laws on the disclosure of Personally Identifiable Information(PII). However PII need to be published for many purposes like research. In such cases, we apply different types of methods like anonymization, encryption etc. This paper discuss about the different methods of anonymization of tabular microdata. The most popular method of data anonymization of tabular data is k-anonymity. However, it suffers from many attacks and hence l-diversity was proposed. The l-diversity anonymization also possessed various limitations and hence t-closeness was proposed. This paper summarize these anonymization techniques and their limitations.