A Comparative Study of Data Anonymization Techniques

In today's digital era, it is a very common practice for organizations to collect data from individual users. The collected data is then stored in multiple databases which contain personally identifiable information (PII). This may lead to a major source of privacy risk for the database. Variou...

Full description

Saved in:
Bibliographic Details
Main Authors: Murthy, S., Abu Bakar, A., Abdul Rahim, F., Ramli, R.
Format: Conference Paper
Language:English
Published: 2020
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-13031
record_format dspace
spelling my.uniten.dspace-130312020-07-06T07:02:56Z A Comparative Study of Data Anonymization Techniques Murthy, S. Abu Bakar, A. Abdul Rahim, F. Ramli, R. In today's digital era, it is a very common practice for organizations to collect data from individual users. The collected data is then stored in multiple databases which contain personally identifiable information (PII). This may lead to a major source of privacy risk for the database. Various privacy preservation techniques have been proposed such as perturbation, anonymization and cryptographic. In this study, five anonymization techniques are compared using the same dataset. In addition to that, this study reviews the strengths and weaknesses of the different technique. In the evaluation of efficiency, suppression is found as the most efficient while swapping is in the last place. It is also revealed that swapping is the most resource-consuming technique while suppressing being less resource consuming. © 2019 IEEE. 2020-02-03T03:29:55Z 2020-02-03T03:29:55Z 2019 Conference Paper 10.1109/BigDataSecurity-HPSC-IDS.2019.00063 en
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
language English
description In today's digital era, it is a very common practice for organizations to collect data from individual users. The collected data is then stored in multiple databases which contain personally identifiable information (PII). This may lead to a major source of privacy risk for the database. Various privacy preservation techniques have been proposed such as perturbation, anonymization and cryptographic. In this study, five anonymization techniques are compared using the same dataset. In addition to that, this study reviews the strengths and weaknesses of the different technique. In the evaluation of efficiency, suppression is found as the most efficient while swapping is in the last place. It is also revealed that swapping is the most resource-consuming technique while suppressing being less resource consuming. © 2019 IEEE.
format Conference Paper
author Murthy, S.
Abu Bakar, A.
Abdul Rahim, F.
Ramli, R.
spellingShingle Murthy, S.
Abu Bakar, A.
Abdul Rahim, F.
Ramli, R.
A Comparative Study of Data Anonymization Techniques
author_facet Murthy, S.
Abu Bakar, A.
Abdul Rahim, F.
Ramli, R.
author_sort Murthy, S.
title A Comparative Study of Data Anonymization Techniques
title_short A Comparative Study of Data Anonymization Techniques
title_full A Comparative Study of Data Anonymization Techniques
title_fullStr A Comparative Study of Data Anonymization Techniques
title_full_unstemmed A Comparative Study of Data Anonymization Techniques
title_sort comparative study of data anonymization techniques
publishDate 2020
_version_ 1672614200305778688
score 13.211869