Enhanced k-Anonymity model based on clustering to overcome Temporal attack in Privacy Preserving Data Publishing
Author
Abstract

The infrastructure required for data storage and processing has become increasingly feasible, and hence, there has been a massive growth in the field of data acquisition and analysis. This acquired data is published, empowering organizations to make informed data-driven decisions based on previous trends. However, data publishing has led to the compromise of privacy as a result of the release of entity-specific information. PrivacyPreserving Data Publishing [1] can be accomplished by methods such as Data S wapping, Differential Privacy, and the likes of k-Anonymity. k-Anonymity is a well-established method used to protect the privacy of the data published. We propose a clustering-based novel algorithm named SAC or the S core, Arrange, and Cluster Algorithm to pre serve privacy based on k-Anonymity. This method outperforms existing methods such as the Mondrian Algorithm by K. LeFevre and the One-pass K-means Algorithm by Jun-Lin Lin from a data quality perspective. S AC can be used to overcome temporal attack across subsequent releases of published data. To measure data quality post anonymization we present a metric that takes into account the relative loss in the information, that occurs while generalizing attribute values.

Year of Publication
2022
Date Published
jul
Publisher
IEEE
Conference Location
Bangalore, India
ISBN Number
978-1-66549-781-7
URL
https://ieeexplore.ieee.org/document/9865682/
DOI
10.1109/CONECCT55679.2022.9865682
Google Scholar | BibTeX | DOI