The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives: Privacy Preserving Data Mining techniques deal with the secure data publication or communication without revealing the private and sensitive information about any individual. Anonymization technique has been considered as one of the most effective techniques since it can provide better tradeoff between data utility and privacy preservation. Methods/Statistical Analysis: Existing anonymization techniques works on individual attributes and their cardinalities and they do not consider the relations among different attributes of the data. In this paper we have considered auxiliary information and entropy and mutual information to calculate distribution of entities in an attribute and relations among different attributes respectively. Based on these calculations we shall be analyzing the best generalization level for data anonymization. Findings: An adverse user can analyze the data with numerous possible perspectives viz. auxiliary information, theoretical and manual data analysis and try to exploit the data vulnerability, so improved data privacy can be achieved if we could also see with the adversary eyes. Applications/Improvements: Different other techniques can be applied to find distribution and relations on the basis of data background and its area of application.

Keywords

Auxiliary Information, Data Anonymization, Entropy, Mutual Information, Privacy Preserving Data Mining (PPDM).
User