Query Processing with K-Anonymity

Provided by: Computer Science Journals
Topic: Data Management
Format: PDF
Anonymization techniques are used to ensure the privacy preservation of the data owners, especially for personal and sensitive data. While in most cases, data reside inside the database management system; most of the proposed anonymization techniques operate on and anonymize isolated datasets stored outside the DBMS. Hence, most of the desired functionalities of the DBMS are lost, e.g., consistency, recoverability and efficient querying. In this paper, the authors address the challenges involved in enforcing the data privacy inside the DBMS.

Find By Topic