The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


As there are new techniques growing to reveal the hidden information on data, the threat towards those data also increases. Therefore, privacy preservation in data mining is an emerging research area which develops various algorithms to anonymize the data provided for data mining. The existing methodology handles the tradeoff between utility and privacy of data in a more expensive way in terms of execution time. In this paper, a simple Anonymization technique using subclustering is specified which achieves maximum privacy and also utility with minimum execution time. The methodology is explained with algorithm and the results are compared with the baseline method.

Keywords

Anonymization, Clustering, Isometric Transformation, Privacy Preservation
User