Query Processing with K-Anonymity

Anonymization techniques are used to ensure the privacy preservation of the data owners, especially for personal and sensitive data. While in most cases, data reside inside the database management system; most of the proposed anonymization techniques operate on and anonymize isolated datasets stored outside the DBMS. Hence, most of the desired functionalities of the DBMS are lost, e.g., consistency, recoverability and efficient querying. In this paper, the authors address the challenges involved in enforcing the data privacy inside the DBMS.

Provided by: Computer Science Journals Topic: Data Management Date Added: Apr 2012 Format: PDF

Find By Topic