Authors :
Hanumanthappa S; Prashantha S J; Vishwanath B R; Sathisha M S
Volume/Issue :
Volume 10 - 2025, Issue 6 - June
Google Scholar :
https://tinyurl.com/2ecnrf98
DOI :
https://doi.org/10.38124/ijisrt/25jun1862
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 30 to 40 days to display the article.
Abstract :
Many organizations like small and medium business (SMB), the datasets are being actively collected and stored
by businesses. The majority of them have acknowledged the potential significance of this data as a source of information for
corporate decision-making. Privacy preservation in data publishing is required to protecting sensitive information. There
are several ways that the personal data might be utilized improperly. This study presents a brief overview of a number of
strategies, including generalization and bucketization, both of which have been developed for privacy preservation in micro
data publishing. Recent research has demonstrated that generalizing to high-dimensional data will result in significant
information loss, and bucketization doesn't prevent membership disclosure, so it can't be applied to data where there isn't
a distinct distinction between sensitive and quasi-identifying attributes. The generalization and bucketization approaches
for anonymization are designed to protect your privacy when creating micro data. These methods can be applied to privacy
preservation in data publishing. Also, we look at a game theory model and compare the RSA and ECC algorithm.
Keywords :
Privacy Preservation, Data Publishing, Data Mining, ECC Algorithm.
References :
- CH. Srikanth Reddy, MD. John Saida” A Novel Approach to Privacy Preserving Data Publishing Using Slicing Technique” International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 8, November 2014, PP 55-63.
- S. Gokila, Dr. P. Venkateswari “A SURVEY ON PRIVACY PRESERVING DATA PUBLISHING”, International Journal on Cybernetics & Informatics (IJCI) Vol. 3, No. 1, February 2014.
- V. Arul, C. Vairavel, M. Prakash and N.V. Kousik “Privacy Preservation Of Micro Data Publishing Using Fragmentation “ Ictact Journal On Soft Computing, April 2019, Volume: 09, Issue: 03. Doi: 10.21917/Ijsc.2019.0271
- Shah, Hitarth, Kakkad, Vishruti, Patel, Reema, Doshi, Nishant" A survey on game theoretic approaches for privacy preservation in data mining and network security". 16th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2019), Volume 155, page 686-691, https://doi.org/10.1016/j.procs.2019.08.098
- Qinghai Liu, Hong Shen, Ying Peng Sang “A Privacy-preserving Data Publishing Method for Multiple Numerical Sensitive Attributes via Clustering and Multi-Sensitive Bucketization” 2014 Sixth International Symposium on Parallel Architectures, Algorithms and Programming2168-3034/14© 2014 IEEE.
- Amar Paul Singh, Ms. Dhanshri Parihar” A Review of Privacy Preserving Data Publishing Technique” International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 (Volume-2, Issue-6).
- Gabriel Ghinita, Member IEEE, Panos Kalnis, Yufei Tao,” Anonymous Publication of Sensitive Transactional Data” in Proc. Of IEEE Transactions on Knowledge and Data Engineering February 2011 (vol. 23 no. 2) pp. 161-174.
- G. Ghinita, Y. Tao, and P. Kalnis, “On the Anonymization of Sparse High-Dimensional Data,” Proc. IEEE 24th Int’l Conf. Data Eng. (ICDE), pp. 715-724, 2008.
- Benjamin C M Fung, Ke Wang, Ada wai-cheefu and Philip S Yu, “Privacy preservation in data publishing concepts and techniques”, Data mining and knowledge discovery series (2010).
- E. Rasmusen, “Games and Information: An introduction to game theory”, vol.2, Cambridge, MA, USA: Blackwell,1994
- https://avinetworks.com/glossary/elliptic-curve-cryptography.
- Dindayal Mahto, Dilip Kumar Yadav “RSA and ECC: A Comparative Analysis” International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 19 (2017) pp. 9053-9061.
- Xiaokui Xiao, Yufei Tao “Personalized Privacy Preservation” SIGMOD 2006, June 27–29, 2006, Chicago, Illinois, USA.
- Jianfeng Xia, Min Yu1, Ying Yang, Hao Jin “Personalized Privacy-Preserving with high performance: anonymity” 2018 IEEE Symposium on Computers and Communications (ISCC) 978-1-5386-6950-1/18.
- Jasmina N Vanasiwala, Nirali R Nanavati” Privacy preserving data publishing of multiple sensitive attributes by using various anonymization techniques “Proceedings of the Fourth International Conference on Computing Methodologies and Communication (ICCMC 2020) ISBN:978-1-7281-4889-2.
- Michael Wooldridge, “AI and Game Theory “University of Oxford: 1541-1672/12 © 2012 IEEE.
- E. Poovammal, Dr. M. Ponnavaikko “Dr. M. Ponnavaikko” 2009 IEEE International Advance Computing Conference (IACC 2009) Patiala, India, 6-7 March 2009.
- www.wikipedia.org
- Ge, YF., Wang, H., Cao, J. et al. Privacy-preserving data publishing: an information-driven distributed genetic algorithm. World Wide Web 27, 1 (2024). https://doi.org/10.1007/s11280-024-01241-y
- Nidhi Desai, Manik Lal Das, Payal Chaudhari, Naveen Kumar, "Background knowledge attacks in privacy-preserving data publishing models, Computers & Security" Volume 122,2022,102874, ISSN 0167-4048,https://doi.org/10.1016/j.cose.2022.102874.
Many organizations like small and medium business (SMB), the datasets are being actively collected and stored
by businesses. The majority of them have acknowledged the potential significance of this data as a source of information for
corporate decision-making. Privacy preservation in data publishing is required to protecting sensitive information. There
are several ways that the personal data might be utilized improperly. This study presents a brief overview of a number of
strategies, including generalization and bucketization, both of which have been developed for privacy preservation in micro
data publishing. Recent research has demonstrated that generalizing to high-dimensional data will result in significant
information loss, and bucketization doesn't prevent membership disclosure, so it can't be applied to data where there isn't
a distinct distinction between sensitive and quasi-identifying attributes. The generalization and bucketization approaches
for anonymization are designed to protect your privacy when creating micro data. These methods can be applied to privacy
preservation in data publishing. Also, we look at a game theory model and compare the RSA and ECC algorithm.
Keywords :
Privacy Preservation, Data Publishing, Data Mining, ECC Algorithm.