Anonymization of Continuously Disseminating Database Using Product Homomorphic Encryption Scheme

k-anonymization optimization algorithm, serves as a vital-privacy protection mechanism in data privacy reservation. Apart from homogeneity background knowledge attacks to which k-anonymizationis vulnerable to, it considers only single static release, thereby protecting data up to the first release or the first recipient-only but in practice, data sources are dynamically growing rapidly every day and every hour, and the updated data may be published as and when updated at the same time preserving the anonymity. An improved method for privacy protection proposed in the literature issky stream k-anonymity facilitating k-anonymity on data streams.

Provided by: International Journal of Communications and Engineering Topic: Security Date Added: Mar 2012 Format: PDF

Find By Topic