International Journal of Emerging Technology and Advanced Engineering (IJETAE)
Breaching privacy of individual data and the measures to prevent the same from attackers has become the most interesting topic of research on the day. In this paper, the authors have made a brief survey on various anonymization principles and practices, privacy preserving techniques beyond k-anonymity. Principles designed in-order to prevent the proximity breaching of data are studied in depth. Concept of perturbation is investigated and practical applications are revealed. Certain attacks on anonymized data and certain approaches proposed in literature to prevent the same are also studied in detail.