International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
It's habit to collect data in the format of digital information by governments, corporations, and individuals. So to protect that information by sectors uses different techniques such as k-anonymization. In k-anonymization databases, its needs to determine when someone inserted a tuple and database is still k-anonymous. For Accessing database is in controlled. Because for certain experiments that need to be maintained data confidentially. Whether a k-anonymous database retains anonymity once a new tuple is being inserted to it without violets the sensitive attributes and the database.