Publication Type : Journal Article
Publisher : International Journal of Emerging Technology Advanced Engineering
Source : International Journal of Emerging Technology & Advanced Engineering , ISO 9001:2008 certified journal, Volume 3, Issue 10 (2013)
Url : https://pdfs.semanticscholar.org/ad0b/3437a08020250be9cd5bc0dcd3e14453474e.pdf(link is external)
Keywords : Anonymization, Attacker, Perturbation, Privacy, Security
Campus : Coimbatore
School : Centre for Cybersecurity Systems and Networks
Center : TIFAC CORE in Cyber Security
Department : cyber Security
Verified : Yes
Year : 2013
Abstract : Breaching privacy of individual data and the measures to prevent the same from attackers has become the most interesting topic of research on the day. In this paper we have made a brief survey on various anonymization principles and practices, privacy preserving techniques beyond kanonymity. Principles designed inorder to prevent the proximity breaching of data are studied in depth. Concept of perturbation is investigated and practical applications are revealed. Certain attacks on anonymized data and certain approaches proposed in literature to prevent the same are also studied in detail
Cite this Research Publication : Santhya R, “Survey On Privacy Preserving Data Publishing Of Numerical Sensitive Data”, International Journal of Emerging Technology & Advanced Engineering , vol. 3, no. 10, 2013.