Please use this identifier to cite or link to this item: http://dspace.uniten.edu.my/jspui/handle/123456789/13031
DC FieldValueLanguage
dc.contributor.authorMurthy, S.en_US
dc.contributor.authorAbu Bakar, A.en_US
dc.contributor.authorAbdul Rahim, F.en_US
dc.contributor.authorRamli, R.en_US
dc.date.accessioned2020-02-03T03:29:55Z-
dc.date.available2020-02-03T03:29:55Z-
dc.date.issued2019-
dc.description.abstractIn today's digital era, it is a very common practice for organizations to collect data from individual users. The collected data is then stored in multiple databases which contain personally identifiable information (PII). This may lead to a major source of privacy risk for the database. Various privacy preservation techniques have been proposed such as perturbation, anonymization and cryptographic. In this study, five anonymization techniques are compared using the same dataset. In addition to that, this study reviews the strengths and weaknesses of the different technique. In the evaluation of efficiency, suppression is found as the most efficient while swapping is in the last place. It is also revealed that swapping is the most resource-consuming technique while suppressing being less resource consuming. © 2019 IEEE.en_US
dc.language.isoenen_US
dc.titleA Comparative Study of Data Anonymization Techniquesen_US
dc.typeConference Paperen_US
dc.identifier.doi10.1109/BigDataSecurity-HPSC-IDS.2019.00063-
item.fulltextWith Fulltext-
item.grantfulltextopen-
Appears in Collections:UNITEN Scholarly Publication
Files in This Item:
File SizeFormat 
A Comparative Study of Data Anonymization.pdf298.16 kBAdobe PDFView/Open
Show simple item record

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.