A Study on k-anonymity, l-diversity, and t-closeness Techniques of Privacy Preservation Data Publishing |
||||
|
||||
|
||||
BibTeX: |
||||
@article{IJIRSTV6I6015, |
||||
Abstract: |
||||
Most organizations are dealing with massive amounts of information collection and are stored in large databases. Personal health record (PHR) is an emerging patient-centered model of exchange of health information, often outsourced for third-party storage, such as cloud providers. There have been wide-ranging issues regarding privacy, however, as personal health data may be exposed to those third party servers and unauthorized parties. This work aims to highlight three of the popular strategies for clinical anonymization, namely k-anonymity, l-diversity, and t-closeness. There is also a summary of the benefits and weaknesses of these strategies. Extensive analytical and experimental findings are presented showing our proposed schemes security, scalability and performance. |
||||
Keywords: |
||||
health records; data anonymization; k-anonymity; l-diversity; t-closeness |
||||