A Comparative Study of Data Anonymization Techniques

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In today's digital era, it is a very common practice for organizations to collect data from individual users. The collected data is then stored in multiple databases which contain personally identifiable information (PII). This may lead to a major source of privacy risk for the database. Various privacy preservation techniques have been proposed such as perturbation, anonymization and cryptographic. In this study, five anonymization techniques are compared using the same dataset. In addition to that, this study reviews the strengths and weaknesses of the different technique. In the evaluation of efficiency, suppression is found as the most efficient while swapping is in the last place. It is also revealed that swapping is the most resource-consuming technique while suppressing being less resource consuming.

Original languageEnglish
Title of host publicationProceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages306-309
Number of pages4
ISBN (Electronic)9781728100067
DOIs
Publication statusPublished - 01 May 2019
Event5th IEEE International Conference on Big Data Security on Cloud, 5th IEEE International Conference on High Performance and Smart Computing and 4th IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2019 - Washington, United States
Duration: 27 May 201929 May 2019

Publication series

NameProceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019

Conference

Conference5th IEEE International Conference on Big Data Security on Cloud, 5th IEEE International Conference on High Performance and Smart Computing and 4th IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2019
CountryUnited States
CityWashington
Period27/05/1929/05/19

Fingerprint

Anonymization
Comparative study
Resources
Data base
Privacy
Perturbation
Evaluation

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Cite this

Murthy, S., Abu Bakar, A., Abdul Rahim, F., & Ramli, R. (2019). A Comparative Study of Data Anonymization Techniques. In Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019 (pp. 306-309). [8819477] (Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2019.00063
Murthy, Suntherasvaran ; Abu Bakar, Asmidar ; Abdul Rahim, Fiza ; Ramli, Ramona. / A Comparative Study of Data Anonymization Techniques. Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019. Institute of Electrical and Electronics Engineers Inc., 2019. pp. 306-309 (Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019).
@inproceedings{0098648017df450985238dd5088d49a7,
title = "A Comparative Study of Data Anonymization Techniques",
abstract = "In today's digital era, it is a very common practice for organizations to collect data from individual users. The collected data is then stored in multiple databases which contain personally identifiable information (PII). This may lead to a major source of privacy risk for the database. Various privacy preservation techniques have been proposed such as perturbation, anonymization and cryptographic. In this study, five anonymization techniques are compared using the same dataset. In addition to that, this study reviews the strengths and weaknesses of the different technique. In the evaluation of efficiency, suppression is found as the most efficient while swapping is in the last place. It is also revealed that swapping is the most resource-consuming technique while suppressing being less resource consuming.",
author = "Suntherasvaran Murthy and {Abu Bakar}, Asmidar and {Abdul Rahim}, Fiza and Ramona Ramli",
year = "2019",
month = "5",
day = "1",
doi = "10.1109/BigDataSecurity-HPSC-IDS.2019.00063",
language = "English",
series = "Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "306--309",
booktitle = "Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019",
address = "United States",

}

Murthy, S, Abu Bakar, A, Abdul Rahim, F & Ramli, R 2019, A Comparative Study of Data Anonymization Techniques. in Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019., 8819477, Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019, Institute of Electrical and Electronics Engineers Inc., pp. 306-309, 5th IEEE International Conference on Big Data Security on Cloud, 5th IEEE International Conference on High Performance and Smart Computing and 4th IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2019, Washington, United States, 27/05/19. https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2019.00063

A Comparative Study of Data Anonymization Techniques. / Murthy, Suntherasvaran; Abu Bakar, Asmidar; Abdul Rahim, Fiza; Ramli, Ramona.

Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019. Institute of Electrical and Electronics Engineers Inc., 2019. p. 306-309 8819477 (Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - A Comparative Study of Data Anonymization Techniques

AU - Murthy, Suntherasvaran

AU - Abu Bakar, Asmidar

AU - Abdul Rahim, Fiza

AU - Ramli, Ramona

PY - 2019/5/1

Y1 - 2019/5/1

N2 - In today's digital era, it is a very common practice for organizations to collect data from individual users. The collected data is then stored in multiple databases which contain personally identifiable information (PII). This may lead to a major source of privacy risk for the database. Various privacy preservation techniques have been proposed such as perturbation, anonymization and cryptographic. In this study, five anonymization techniques are compared using the same dataset. In addition to that, this study reviews the strengths and weaknesses of the different technique. In the evaluation of efficiency, suppression is found as the most efficient while swapping is in the last place. It is also revealed that swapping is the most resource-consuming technique while suppressing being less resource consuming.

AB - In today's digital era, it is a very common practice for organizations to collect data from individual users. The collected data is then stored in multiple databases which contain personally identifiable information (PII). This may lead to a major source of privacy risk for the database. Various privacy preservation techniques have been proposed such as perturbation, anonymization and cryptographic. In this study, five anonymization techniques are compared using the same dataset. In addition to that, this study reviews the strengths and weaknesses of the different technique. In the evaluation of efficiency, suppression is found as the most efficient while swapping is in the last place. It is also revealed that swapping is the most resource-consuming technique while suppressing being less resource consuming.

UR - http://www.scopus.com/inward/record.url?scp=85072765291&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85072765291&partnerID=8YFLogxK

U2 - 10.1109/BigDataSecurity-HPSC-IDS.2019.00063

DO - 10.1109/BigDataSecurity-HPSC-IDS.2019.00063

M3 - Conference contribution

AN - SCOPUS:85072765291

T3 - Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019

SP - 306

EP - 309

BT - Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Murthy S, Abu Bakar A, Abdul Rahim F, Ramli R. A Comparative Study of Data Anonymization Techniques. In Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019. Institute of Electrical and Electronics Engineers Inc. 2019. p. 306-309. 8819477. (Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019). https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2019.00063