IJCATR Volume 4 Issue 4

Anonymizing and Confidential Databases for Privacy Protection Using Suppression and Generalization Based Protocols

K.Sathyamoorthy S.Venkata Lakshmi Tina Belinda Miranda
10.7753/IJCATR0404.1011
keywords : Confidentiality, Anonymity, Privacy, Secure Computation

PDF
The technique of k-anonymization has been proposed in the literature as an alternative way to release public information, while ensuring both data privacy and data confidentiality. “X” owns a k-anonymous database and needs to determine whether “X” database, when inserted with a tuple owned by “Y”, is still k-anonymous. Clearly, allowing “X” to directly read the contents of the tuple breaks the privacy of “Y”. In this place,”Y” not get the privacy of own information because the information of “Y” can be accessed by “X” without the prior knowledge of “Y”. On the other hand, the confidentiality of the database managed by “X” is violated once “Y” has access to the contents of database. Thus, the problem is to check whether the database inserted with the tuple is still k-anonymous, without letting “X” and “Y” knows the contents of the tuple and database respectively. In this paper, we propose two protocols solving this problem that is suppression-Based & Generalization-Based k-anonymous and confidential databases using through prototype architecture. And also those two protocols maintain privacy and confidential information in k-anonymous database.
@artical{k442015ijcatr04041011,
Title = "Anonymizing and Confidential Databases for Privacy Protection Using Suppression and Generalization Based Protocols",
Journal ="International Journal of Computer Applications Technology and Research(IJCATR)",
Volume = "4",
Issue ="4",
Pages ="274 - 279",
Year = "2015",
Authors ="K.Sathyamoorthy S.Venkata Lakshmi Tina Belinda Miranda"}
  • null