SlideShare a Scribd company logo
1 of 1
Download to read offline
International Journal of Computing Algorithm, Vol 1(1), June 2012
ISSN(Print):2278-2397
Website: www.ijcoa.com
Protecting Privacy When Disclosing Information: K
Anonymity and its Enforcement through
Suppression
V.Khanaa1
, K.P.Thooyamani2
1
Dean-Centre for Information, Bharath University, Chennai
2
Vice Chancellor, Bharath University, Chennai
E-mail: thooyamani@hotmail.com, drvkannan62@yahoo.com
Abstract
Anonymization means to remove personal identifier or converted into non readable form by
human to protect private or personal information. Data anonymization can be performed in
different ways but in this paper k-anonymization approach is used. Suppose one person A
having his own k-anonymous database and needs to determine whether database is still k-
anonymous if tuple inserted by another person B. For some applications (for example,
Student’s record), database needs to be confidential, so access to the database is strictly
controlled. The confidentiality of the database managed by the owner is violated once others
have access to the contents of the database. Thus, Problem is to check whether the database
inserted with the tuple is still k-anonymous without letting the owner A and others (B) to
know the content of the tuple and database respectively. In this paper, we propose a protocol
solving this problem on suppression based k-anonymous and confidential database.

More Related Content

Viewers also liked

4 la malédiction du pharaon
4   la malédiction du pharaon4   la malédiction du pharaon
4 la malédiction du pharaonWolfen Dugondor
 
Defis fantastiques 58 le dragon de la nuit
Defis fantastiques 58   le dragon de la nuitDefis fantastiques 58   le dragon de la nuit
Defis fantastiques 58 le dragon de la nuitWolfen Dugondor
 
Kalite ve Verimlilik Kulübü Faaliyet Raporu 2014-2015
Kalite ve Verimlilik Kulübü Faaliyet Raporu 2014-2015Kalite ve Verimlilik Kulübü Faaliyet Raporu 2014-2015
Kalite ve Verimlilik Kulübü Faaliyet Raporu 2014-2015Hakan Dizginci
 
Canada Gift Giving PPT - 2016
Canada Gift Giving PPT - 2016Canada Gift Giving PPT - 2016
Canada Gift Giving PPT - 2016Mallory Michaelis
 
Vpriv Ready
Vpriv ReadyVpriv Ready
Vpriv ReadyLangLin
 
Apache Spark in Cloud and Hybrid: Why Security and Governance Become More Imp...
Apache Spark in Cloud and Hybrid: Why Security and Governance Become More Imp...Apache Spark in Cloud and Hybrid: Why Security and Governance Become More Imp...
Apache Spark in Cloud and Hybrid: Why Security and Governance Become More Imp...Spark Summit
 

Viewers also liked (10)

4 la malédiction du pharaon
4   la malédiction du pharaon4   la malédiction du pharaon
4 la malédiction du pharaon
 
futbol americano
futbol americano futbol americano
futbol americano
 
л4 анализ одиночного снимка
л4 анализ одиночного снимкал4 анализ одиночного снимка
л4 анализ одиночного снимка
 
Defis fantastiques 58 le dragon de la nuit
Defis fantastiques 58   le dragon de la nuitDefis fantastiques 58   le dragon de la nuit
Defis fantastiques 58 le dragon de la nuit
 
Statistika Dasar Pertemuan 10
Statistika Dasar Pertemuan 10Statistika Dasar Pertemuan 10
Statistika Dasar Pertemuan 10
 
Kalite ve Verimlilik Kulübü Faaliyet Raporu 2014-2015
Kalite ve Verimlilik Kulübü Faaliyet Raporu 2014-2015Kalite ve Verimlilik Kulübü Faaliyet Raporu 2014-2015
Kalite ve Verimlilik Kulübü Faaliyet Raporu 2014-2015
 
Canada Gift Giving PPT - 2016
Canada Gift Giving PPT - 2016Canada Gift Giving PPT - 2016
Canada Gift Giving PPT - 2016
 
Golonka
GolonkaGolonka
Golonka
 
Vpriv Ready
Vpriv ReadyVpriv Ready
Vpriv Ready
 
Apache Spark in Cloud and Hybrid: Why Security and Governance Become More Imp...
Apache Spark in Cloud and Hybrid: Why Security and Governance Become More Imp...Apache Spark in Cloud and Hybrid: Why Security and Governance Become More Imp...
Apache Spark in Cloud and Hybrid: Why Security and Governance Become More Imp...
 

Similar to Protecting Privacy When Disclosing Information: K Anonymity and Its Enforcement through Suppression

Protecting Privacy When Disclosing Information: K Anonymity and its Enforceme...
Protecting Privacy When Disclosing Information: K Anonymity and its Enforceme...Protecting Privacy When Disclosing Information: K Anonymity and its Enforceme...
Protecting Privacy When Disclosing Information: K Anonymity and its Enforceme...ijcnes
 
Privacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential DatabasePrivacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential Databaseijdmtaiir
 
V1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.docV1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.docpraveena06
 
Anonymizing and Confidential Databases for Privacy Protection Using Suppressi...
Anonymizing and Confidential Databases for Privacy Protection Using Suppressi...Anonymizing and Confidential Databases for Privacy Protection Using Suppressi...
Anonymizing and Confidential Databases for Privacy Protection Using Suppressi...Editor IJCATR
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Pvrtechnologies Nellore
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IJITE
 
Identifying ghost users using social media metadata - University College London
Identifying ghost users using social media metadata - University College LondonIdentifying ghost users using social media metadata - University College London
Identifying ghost users using social media metadata - University College LondonGreg Kawere
 
Research Ethics in the 2.0 Era
Research Ethics in the 2.0 EraResearch Ethics in the 2.0 Era
Research Ethics in the 2.0 EraMichael Zimmer
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012Michael Zimmer
 
Hybrid Fuzzy Approches for Networks
Hybrid Fuzzy Approches for NetworksHybrid Fuzzy Approches for Networks
Hybrid Fuzzy Approches for Networksijcoa
 
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata PrivacyTwo-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacydbpublications
 
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Kumar Goud
 
Part02 access control authentication
Part02 access control   authenticationPart02 access control   authentication
Part02 access control authenticationLê Liêu
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online socialijsptm
 
Differential Privacy for Information Retrieval
Differential Privacy for Information RetrievalDifferential Privacy for Information Retrieval
Differential Privacy for Information RetrievalGrace Hui Yang
 
6.[34 38]face location - a novel approach to post the user global location
6.[34 38]face location - a novel approach to post the user global location6.[34 38]face location - a novel approach to post the user global location
6.[34 38]face location - a novel approach to post the user global locationAlexander Decker
 

Similar to Protecting Privacy When Disclosing Information: K Anonymity and Its Enforcement through Suppression (20)

Protecting Privacy When Disclosing Information: K Anonymity and its Enforceme...
Protecting Privacy When Disclosing Information: K Anonymity and its Enforceme...Protecting Privacy When Disclosing Information: K Anonymity and its Enforceme...
Protecting Privacy When Disclosing Information: K Anonymity and its Enforceme...
 
Privacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential DatabasePrivacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential Database
 
V1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.docV1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.doc
 
Ej24856861
Ej24856861Ej24856861
Ej24856861
 
Anonymizing and Confidential Databases for Privacy Protection Using Suppressi...
Anonymizing and Confidential Databases for Privacy Protection Using Suppressi...Anonymizing and Confidential Databases for Privacy Protection Using Suppressi...
Anonymizing and Confidential Databases for Privacy Protection Using Suppressi...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
 
Identifying ghost users using social media metadata - University College London
Identifying ghost users using social media metadata - University College LondonIdentifying ghost users using social media metadata - University College London
Identifying ghost users using social media metadata - University College London
 
Research Ethics in the 2.0 Era
Research Ethics in the 2.0 EraResearch Ethics in the 2.0 Era
Research Ethics in the 2.0 Era
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012
 
Hybrid Fuzzy Approches for Networks
Hybrid Fuzzy Approches for NetworksHybrid Fuzzy Approches for Networks
Hybrid Fuzzy Approches for Networks
 
Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...
 
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata PrivacyTwo-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
 
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
 
Part02 access control authentication
Part02 access control   authenticationPart02 access control   authentication
Part02 access control authentication
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online social
 
Differential Privacy for Information Retrieval
Differential Privacy for Information RetrievalDifferential Privacy for Information Retrieval
Differential Privacy for Information Retrieval
 
6.[34 38]face location - a novel approach to post the user global location
6.[34 38]face location - a novel approach to post the user global location6.[34 38]face location - a novel approach to post the user global location
6.[34 38]face location - a novel approach to post the user global location
 

More from ijcoa

SPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
SPSS: An Effective Tool to Compute Learning Outcomes in AcadamicsSPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
SPSS: An Effective Tool to Compute Learning Outcomes in Acadamicsijcoa
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approachijcoa
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS Techniqueijcoa
 
Analysis of Women Harassment in Villages Using CETD Matrix Modal
Analysis of Women Harassment in Villages Using CETD Matrix ModalAnalysis of Women Harassment in Villages Using CETD Matrix Modal
Analysis of Women Harassment in Villages Using CETD Matrix Modalijcoa
 
Solving Assignment Problem Using L-R Fuzzy Numbers
Solving Assignment Problem Using L-R Fuzzy NumbersSolving Assignment Problem Using L-R Fuzzy Numbers
Solving Assignment Problem Using L-R Fuzzy Numbersijcoa
 
Fuzzy Chroamtic Number of Line Graph using α-Cuts
Fuzzy Chroamtic Number of Line Graph using α-CutsFuzzy Chroamtic Number of Line Graph using α-Cuts
Fuzzy Chroamtic Number of Line Graph using α-Cutsijcoa
 
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...ijcoa
 
Dual Trapezoidal Fuzzy Number and its Applications
Dual Trapezoidal Fuzzy Number and its ApplicationsDual Trapezoidal Fuzzy Number and its Applications
Dual Trapezoidal Fuzzy Number and its Applicationsijcoa
 
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...ijcoa
 
Saturation Index of π(D(r,s))
Saturation Index of π(D(r,s))Saturation Index of π(D(r,s))
Saturation Index of π(D(r,s))ijcoa
 
Classification and Prediction of Heart Disease from Diabetes Patients using H...
Classification and Prediction of Heart Disease from Diabetes Patients using H...Classification and Prediction of Heart Disease from Diabetes Patients using H...
Classification and Prediction of Heart Disease from Diabetes Patients using H...ijcoa
 
Format Preserving Encryption for Small Domain
Format Preserving Encryption for Small DomainFormat Preserving Encryption for Small Domain
Format Preserving Encryption for Small Domainijcoa
 
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...ijcoa
 
Clustering and Classification in Support of Climatology to mine Weather Data ...
Clustering and Classification in Support of Climatology to mine Weather Data ...Clustering and Classification in Support of Climatology to mine Weather Data ...
Clustering and Classification in Support of Climatology to mine Weather Data ...ijcoa
 
Test Suite Reduction Based on Fault Detection with Cost Optimization
Test Suite Reduction Based on Fault Detection with Cost OptimizationTest Suite Reduction Based on Fault Detection with Cost Optimization
Test Suite Reduction Based on Fault Detection with Cost Optimizationijcoa
 
Artifact Facet Ranking and It’s Applications
Artifact Facet Ranking and It’s ApplicationsArtifact Facet Ranking and It’s Applications
Artifact Facet Ranking and It’s Applicationsijcoa
 
Effectual Data Integrity Checking Technique Based on Number Theory
Effectual Data Integrity Checking Technique Based on Number TheoryEffectual Data Integrity Checking Technique Based on Number Theory
Effectual Data Integrity Checking Technique Based on Number Theoryijcoa
 
Micro-Neuro-Sensor Recording of STN Neurons of the Human Brain
Micro-Neuro-Sensor Recording of STN Neurons of the Human BrainMicro-Neuro-Sensor Recording of STN Neurons of the Human Brain
Micro-Neuro-Sensor Recording of STN Neurons of the Human Brainijcoa
 
EDM: Finding Answers to Reduce Dropout Rates in Schools
EDM: Finding Answers to Reduce Dropout Rates in SchoolsEDM: Finding Answers to Reduce Dropout Rates in Schools
EDM: Finding Answers to Reduce Dropout Rates in Schoolsijcoa
 
Analysis of Effort Estimation Model in Traditional and Agile (USING METRICS ...
Analysis of Effort Estimation Model in Traditional and Agile  (USING METRICS ...Analysis of Effort Estimation Model in Traditional and Agile  (USING METRICS ...
Analysis of Effort Estimation Model in Traditional and Agile (USING METRICS ...ijcoa
 

More from ijcoa (20)

SPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
SPSS: An Effective Tool to Compute Learning Outcomes in AcadamicsSPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
SPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS Technique
 
Analysis of Women Harassment in Villages Using CETD Matrix Modal
Analysis of Women Harassment in Villages Using CETD Matrix ModalAnalysis of Women Harassment in Villages Using CETD Matrix Modal
Analysis of Women Harassment in Villages Using CETD Matrix Modal
 
Solving Assignment Problem Using L-R Fuzzy Numbers
Solving Assignment Problem Using L-R Fuzzy NumbersSolving Assignment Problem Using L-R Fuzzy Numbers
Solving Assignment Problem Using L-R Fuzzy Numbers
 
Fuzzy Chroamtic Number of Line Graph using α-Cuts
Fuzzy Chroamtic Number of Line Graph using α-CutsFuzzy Chroamtic Number of Line Graph using α-Cuts
Fuzzy Chroamtic Number of Line Graph using α-Cuts
 
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
 
Dual Trapezoidal Fuzzy Number and its Applications
Dual Trapezoidal Fuzzy Number and its ApplicationsDual Trapezoidal Fuzzy Number and its Applications
Dual Trapezoidal Fuzzy Number and its Applications
 
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
 
Saturation Index of π(D(r,s))
Saturation Index of π(D(r,s))Saturation Index of π(D(r,s))
Saturation Index of π(D(r,s))
 
Classification and Prediction of Heart Disease from Diabetes Patients using H...
Classification and Prediction of Heart Disease from Diabetes Patients using H...Classification and Prediction of Heart Disease from Diabetes Patients using H...
Classification and Prediction of Heart Disease from Diabetes Patients using H...
 
Format Preserving Encryption for Small Domain
Format Preserving Encryption for Small DomainFormat Preserving Encryption for Small Domain
Format Preserving Encryption for Small Domain
 
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
 
Clustering and Classification in Support of Climatology to mine Weather Data ...
Clustering and Classification in Support of Climatology to mine Weather Data ...Clustering and Classification in Support of Climatology to mine Weather Data ...
Clustering and Classification in Support of Climatology to mine Weather Data ...
 
Test Suite Reduction Based on Fault Detection with Cost Optimization
Test Suite Reduction Based on Fault Detection with Cost OptimizationTest Suite Reduction Based on Fault Detection with Cost Optimization
Test Suite Reduction Based on Fault Detection with Cost Optimization
 
Artifact Facet Ranking and It’s Applications
Artifact Facet Ranking and It’s ApplicationsArtifact Facet Ranking and It’s Applications
Artifact Facet Ranking and It’s Applications
 
Effectual Data Integrity Checking Technique Based on Number Theory
Effectual Data Integrity Checking Technique Based on Number TheoryEffectual Data Integrity Checking Technique Based on Number Theory
Effectual Data Integrity Checking Technique Based on Number Theory
 
Micro-Neuro-Sensor Recording of STN Neurons of the Human Brain
Micro-Neuro-Sensor Recording of STN Neurons of the Human BrainMicro-Neuro-Sensor Recording of STN Neurons of the Human Brain
Micro-Neuro-Sensor Recording of STN Neurons of the Human Brain
 
EDM: Finding Answers to Reduce Dropout Rates in Schools
EDM: Finding Answers to Reduce Dropout Rates in SchoolsEDM: Finding Answers to Reduce Dropout Rates in Schools
EDM: Finding Answers to Reduce Dropout Rates in Schools
 
Analysis of Effort Estimation Model in Traditional and Agile (USING METRICS ...
Analysis of Effort Estimation Model in Traditional and Agile  (USING METRICS ...Analysis of Effort Estimation Model in Traditional and Agile  (USING METRICS ...
Analysis of Effort Estimation Model in Traditional and Agile (USING METRICS ...
 

Recently uploaded

Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Silpa
 
Gwalior ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Gwalior ESCORT SERVICE❤CALL GIRL
Gwalior ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Gwalior ESCORT SERVICE❤CALL GIRLGwalior ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Gwalior ESCORT SERVICE❤CALL GIRL
Gwalior ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Gwalior ESCORT SERVICE❤CALL GIRLkantirani197
 
Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Silpa
 
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRingsTransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRingsSérgio Sacani
 
THE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptx
THE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptxTHE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptx
THE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptxANSARKHAN96
 
Genome sequencing,shotgun sequencing.pptx
Genome sequencing,shotgun sequencing.pptxGenome sequencing,shotgun sequencing.pptx
Genome sequencing,shotgun sequencing.pptxSilpa
 
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....muralinath2
 
FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceFAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceAlex Henderson
 
300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptx300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptxryanrooker
 
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...Scintica Instrumentation
 
Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.Silpa
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryAlex Henderson
 
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort ServiceCall Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort Serviceshivanisharma5244
 
Thyroid Physiology_Dr.E. Muralinath_ Associate Professor
Thyroid Physiology_Dr.E. Muralinath_ Associate ProfessorThyroid Physiology_Dr.E. Muralinath_ Associate Professor
Thyroid Physiology_Dr.E. Muralinath_ Associate Professormuralinath2
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .Poonam Aher Patil
 
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxThe Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxseri bangash
 
Human genetics..........................pptx
Human genetics..........................pptxHuman genetics..........................pptx
Human genetics..........................pptxSilpa
 
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.Silpa
 
Grade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its FunctionsGrade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its FunctionsOrtegaSyrineMay
 

Recently uploaded (20)

Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
 
Gwalior ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Gwalior ESCORT SERVICE❤CALL GIRL
Gwalior ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Gwalior ESCORT SERVICE❤CALL GIRLGwalior ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Gwalior ESCORT SERVICE❤CALL GIRL
Gwalior ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Gwalior ESCORT SERVICE❤CALL GIRL
 
Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.
 
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRingsTransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
 
THE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptx
THE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptxTHE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptx
THE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptx
 
Genome sequencing,shotgun sequencing.pptx
Genome sequencing,shotgun sequencing.pptxGenome sequencing,shotgun sequencing.pptx
Genome sequencing,shotgun sequencing.pptx
 
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
 
FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceFAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical Science
 
300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptx300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptx
 
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
 
Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort ServiceCall Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
 
Thyroid Physiology_Dr.E. Muralinath_ Associate Professor
Thyroid Physiology_Dr.E. Muralinath_ Associate ProfessorThyroid Physiology_Dr.E. Muralinath_ Associate Professor
Thyroid Physiology_Dr.E. Muralinath_ Associate Professor
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .
 
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxThe Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptx
 
Human genetics..........................pptx
Human genetics..........................pptxHuman genetics..........................pptx
Human genetics..........................pptx
 
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
 
Grade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its FunctionsGrade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its Functions
 

Protecting Privacy When Disclosing Information: K Anonymity and Its Enforcement through Suppression

  • 1. International Journal of Computing Algorithm, Vol 1(1), June 2012 ISSN(Print):2278-2397 Website: www.ijcoa.com Protecting Privacy When Disclosing Information: K Anonymity and its Enforcement through Suppression V.Khanaa1 , K.P.Thooyamani2 1 Dean-Centre for Information, Bharath University, Chennai 2 Vice Chancellor, Bharath University, Chennai E-mail: thooyamani@hotmail.com, drvkannan62@yahoo.com Abstract Anonymization means to remove personal identifier or converted into non readable form by human to protect private or personal information. Data anonymization can be performed in different ways but in this paper k-anonymization approach is used. Suppose one person A having his own k-anonymous database and needs to determine whether database is still k- anonymous if tuple inserted by another person B. For some applications (for example, Student’s record), database needs to be confidential, so access to the database is strictly controlled. The confidentiality of the database managed by the owner is violated once others have access to the contents of the database. Thus, Problem is to check whether the database inserted with the tuple is still k-anonymous without letting the owner A and others (B) to know the content of the tuple and database respectively. In this paper, we propose a protocol solving this problem on suppression based k-anonymous and confidential database.