This paper is published in Volume-8, Issue-3, 2022
Area
Information Security
Author
Krishna Yanmantram, T. M. Vishnu Mukundan, Jama Surya Teja
Org/Univ
Vellore Institute of Technology, Vellore, Tamil Nadu, India
Keywords
Data Anonymization, ARX, k-Anonymity, Re-Identification Risk
Citations
IEEE
Krishna Yanmantram, T. M. Vishnu Mukundan, Jama Surya Teja. Sensitivity Analysis using k-anonymization, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Krishna Yanmantram, T. M. Vishnu Mukundan, Jama Surya Teja (2022). Sensitivity Analysis using k-anonymization. International Journal of Advance Research, Ideas and Innovations in Technology, 8(3) www.IJARIIT.com.
MLA
Krishna Yanmantram, T. M. Vishnu Mukundan, Jama Surya Teja. "Sensitivity Analysis using k-anonymization." International Journal of Advance Research, Ideas and Innovations in Technology 8.3 (2022). www.IJARIIT.com.
Krishna Yanmantram, T. M. Vishnu Mukundan, Jama Surya Teja. Sensitivity Analysis using k-anonymization, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Krishna Yanmantram, T. M. Vishnu Mukundan, Jama Surya Teja (2022). Sensitivity Analysis using k-anonymization. International Journal of Advance Research, Ideas and Innovations in Technology, 8(3) www.IJARIIT.com.
MLA
Krishna Yanmantram, T. M. Vishnu Mukundan, Jama Surya Teja. "Sensitivity Analysis using k-anonymization." International Journal of Advance Research, Ideas and Innovations in Technology 8.3 (2022). www.IJARIIT.com.
Abstract
It's necessary to keep sensitive data and private data safe. When financial information, healthcare information, and other sensitive consumer or user data are mishandled, they can be destructive. Due to a lack of access control over personal information, individuals may be susceptible to fraud and identity theft. This paper provides an overview of the ideas of data privacy, re-identification risk, and dataset utility, as well as the correlations between the three. On the adult dataset from the UCI Machine Learning Repository, this study presents a sensitivity analysis of the k-anonymization algorithm. ARX, an open-source anonymization tool, was used to show this.