Software

Anonymization of Continuously Disseminating Database Using Product Homomorphicencryption Scheme

Download Now Date Added: Mar 2012
Format: PDF

k-anonymization optimization algorithm, serves as a vital privacy protection mechanism in data privacy reservation. Apart from homogeneity background knowledge attacks to which k-anonymization is vulnerable to, it considers only single static release, thereby protecting data up to the first release or the first recipient only but in practice, data sources are dynamically growing rapidly every day and every hour and the updated data may be published as and when updated at the same time preserving the anonymity. An improved method for privacy protection proposed in the literature is sky stream k-anonymity facilitating k-anonymity on data streams.