Review of research on k-anonymization technique to transform data for privacy preservation
Main Article Content
Abstract
Private information may leak through data disclosure. Although the identifier attributes are suppressed,
re-identification is possible by linking remaining attributes to several sources. Transforming data using the
k-anonymization technique can ensure levels of privacy. This paper reviews the studies and researches of
k-anonymization technique. Firstly, the paper presents basic knowledge, the re-identification problem, related
terminologies, and attribute types. The paper also reviews information loss estimations and transforming
algorithms to achieve k-anonymity property. Lastly, possible attacks are described, and future studies and
researches are suggested.
re-identification is possible by linking remaining attributes to several sources. Transforming data using the
k-anonymization technique can ensure levels of privacy. This paper reviews the studies and researches of
k-anonymization technique. Firstly, the paper presents basic knowledge, the re-identification problem, related
terminologies, and attribute types. The paper also reviews information loss estimations and transforming
algorithms to achieve k-anonymity property. Lastly, possible attacks are described, and future studies and
researches are suggested.
Article Details
How to Cite
Ruangchaijatupon, N. (2014). Review of research on k-anonymization technique to transform data for privacy preservation. Engineering and Applied Science Research, 41(2), 271–281. Retrieved from https://ph01.tci-thaijo.org/index.php/easr/article/view/21800
Issue
Section
REVIEW ARTICLES
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.