Patil, Devyani Vilas (2017) Optimal K-anonymity using Monotonicity Property. MTech thesis.
|PDF (Full text is restricted up to 18.01.2020) |
Restricted to Repository staff only
The Electronic-Era has brought the major challenge to the individual’s privacy by collecting the individual’s information. This information is a threat to the privacy as it is published to the third party for the purpose of either research or study. Even though the identity is not published, based on some informative attributes and publicly available data, fraudulent can access the information which is supposed to be private. As a result, many researchers are attracted towards the challenge and as a result, various approaches are devised by the researchers to anonymize data. Anonymization process should preserve the utility of data after anonymization. Anonymization is basically a skilled work to preserve private data without hiding necessary details required for research and study. Also, it should take less time to process the data. The main goal of the process is hiding data without loss of utility of the data. The work done in this thesis focuses on generalization based approach for data anonymization. Generalization hierarchy in anonymization process is created using all possible transformations that can be applied to obtained anonymized data. This generalization hierarchy possesses a special property called ‘monotonicity’ which reduces the time for anonymity check by applying predictive tagging. Anonymization algorithms with generalization based approach proceeds in two ways. One is binary search and another is a greedy approach. Algorithms which uses binary search approach applies monotonicity property to reduce solution space and greedy approach proceeds rapidly to find a solution. Proposed algorithm uses a greedy approach with monotonicity property to find a globally optimal solution.
|Item Type:||Thesis (MTech)|
|Uncontrolled Keywords:||K-anonymization; Generalization hierarchy; Monotonicity; Predictive tagging|
|Subjects:||Engineering and Technology > Computer and Information Science > Information Security|
|Divisions:||Engineering and Technology > Department of Computer Science|
|Deposited By:||Mr. Kshirod Das|
|Deposited On:||15 Mar 2018 11:39|
|Last Modified:||15 Mar 2018 11:39|
|Supervisor(s):||Mohapatra, Ramesh Kumar|
Repository Staff Only: item control page