Skip to main content

An Improved l-Diversity Anonymisation Algorithm

  • Conference paper
Computer Networks and Intelligent Computing (ICIP 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 157))

Included in the following conference series:

  • 2094 Accesses

Abstract

Use of published organizational data for a variety of purposes has the chance of violation of leakage of individual secret information. Preliminary efforts in this direction are susceptible to leakage of valuable information through quasi identifiers. Over the past few years, several algorithms based upon the concept of k-anonymity [1-2] have been developed, to handle such problems. A better privacy model, called l-diversity [3] was proposed to handle some of the problems in k-anonymity. Our main contribution in this paper is to improve the clustering phase of the OKA algorithm [4] so that it takes care of k-anonymity and l-diversity to a considerable extent and in combination with the improved second and third phases of the algorithm in [5] leads to an efficient l-diversity algorithm. We also show that all the three stages of the algorithm are necessary in order to cover different situations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Bayardo, R.: Data Privacy through Optimal k-Anonymization. In: Proc. of the 21st International Conference on Data Engineering, pp. 217–218 (2005)

    Google Scholar 

  2. Chiu, C.C., Tsai, C.Y.: A k-Anonymity Clustering Method for Effective Data Privacy Preservation. In: Third International Conference on Advanced Data Mining and Applications, ADMA (2007)

    Google Scholar 

  3. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-Diversity: Privacy beyond k-Anonymity. In: Proc. 22nd International Conference Data Engineering (ICDE), vol. 24 (2006)

    Google Scholar 

  4. Byun, J.W., Kamra, A., Bertino, E., Li, N.: Efficient k-Anonymization using Clustering Techniques. In: Kotagiri, R., Radha Krishna, P., Mohania, M., Nantajeewarawat, E. (eds.) DASFAA 2007. LNCS, vol. 4443, pp. 188–200. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Tripathy, B.K., Panda, G.K., Kumaran, K.: A Fast l - Diversity Anonymisation Algorithm. In: Proc. of the Third International Conference on Computer Modeling and Simulation (ICCMS 2011), Mumbai, January 7-9, vol. 2, pp. 648–652 (2011)

    Google Scholar 

  6. Samarati, P., Foresti, S., Vimercati, S.D.C.D., Ciriani, V.: k-Anonymity. In: Advances in Information Security, Springer, Heidelberg (2007)

    Google Scholar 

  7. Tan, P.N., Steinbach, M., Kumar, V.: Introduction to Data Mining, pp. 487–559. Addison-Wesley, Boston (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

B.K., T., K., K., G.K., P. (2011). An Improved l-Diversity Anonymisation Algorithm. In: Venugopal, K.R., Patnaik, L.M. (eds) Computer Networks and Intelligent Computing. ICIP 2011. Communications in Computer and Information Science, vol 157. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22786-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22786-8_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22785-1

  • Online ISBN: 978-3-642-22786-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics