Hybrid Anonymization Technique For Improving The Privacy In Network Data
There has been a considerable research over the last decades on methods for limiting disclosure in data publishing, especially for the last twenty years in the computer science field. Researchers have studied the problems of publishing microdata or network data without revealing any sensitive inform...
| मुख्य लेखक: | |
|---|---|
| स्वरूप: | थीसिस |
| भाषा: | अंग्रेज़ी अंग्रेज़ी |
| प्रकाशित: |
UTeM
2016
|
| विषय: | |
| ऑनलाइन पहुंच: | http://eprints.utem.edu.my/id/eprint/18567/1/Hybrid%20Anonymization%20Technique%20For%20Improving%20The%20Privacy%20In%20Network%20Data%2024%20Pages.pdf http://eprints.utem.edu.my/id/eprint/18567/2/Hybrid%20Anonymization%20Technique%20For%20Improving%20The%20Privacy%20In%20Network%20Data.pdf |
| _version_ | 1846509647180070912 |
|---|---|
| author | Abd Rahim, Yahaya |
| author_facet | Abd Rahim, Yahaya |
| author_sort | Abd Rahim, Yahaya |
| description | There has been a considerable research over the last decades on methods for limiting disclosure in data publishing, especially for the last twenty years in the computer science field. Researchers have studied the problems of publishing microdata or network data without revealing any sensitive information that may have cause the paradigm preservation of information privacy. There are organizations that would like to publish their data for research, advertisement or prediction purposes. Nevertheless, they had the problems in information loss and lack of privacy. Hence, there are a few techniques and research that have been in highlights like the K-anonymity, l-diversity, generalization, clustering and randomization techniques, but most of these techniques is not comprehensive and the chances to lose the information is still high and may cause privacy leakage on the original data. The contribution of this research is the hybrid technique in anonymization process that will improve the protection and the privacy of data. With this better and comprehensive solution, it will decrease the loss of information. There are four major phases in this methodology as research guidance. The first phase is an overview of the entire research process and the second phase is the description of the anonymization process and techniques. It will be followed by the third phase of describing the design and module of the system, and the fourth phase is the researcher highlights on the comparison methods that are designed in this study. The researcher stated that there are two main contributions in this research. The first contribution is to introduce a new technique to anonymize the network data using the hybrid technique; and for the second contribution, the researcher creates a profile of a hybrid anonymization technique based on K-anonymity, l-diversity, generalization, clustering and randomization techniques. It is quite difficult to identify the best technique of anonymization process. Due to this, the researcher provides the details of analyzing, summarizing and profiling of the anonymization techniques. The researcher realizes that there are a few opportunities to advance this research within this domain in the near future, such as implementing a real-time based in anonymization process. Unfortunately, this type of processing needs to be revamped from the architectural design until the data processing part; and it is more thought-provoking if it were implemented in a real-time based or in the batch processing process, if the variable of the optimization is to be used in the anonymization process. Apart from that, the profiling of the anonymization processing techniques will also help the researcher to propose a generalization technique that might be implemented to anonymize data either using the micro or the network data. |
| format | Thesis |
| id | oai:eprints.utem.edu.my:18567 |
| institution | Universiti Teknikal Malaysia Melaka |
| language | English English |
| publishDate | 2016 |
| publisher | UTeM |
| record_format | eprints |
| spelling | oai:eprints.utem.edu.my:185672022-02-21T12:15:41Z http://eprints.utem.edu.my/id/eprint/18567/ Hybrid Anonymization Technique For Improving The Privacy In Network Data Abd Rahim, Yahaya Q Science (General) QA76 Computer software There has been a considerable research over the last decades on methods for limiting disclosure in data publishing, especially for the last twenty years in the computer science field. Researchers have studied the problems of publishing microdata or network data without revealing any sensitive information that may have cause the paradigm preservation of information privacy. There are organizations that would like to publish their data for research, advertisement or prediction purposes. Nevertheless, they had the problems in information loss and lack of privacy. Hence, there are a few techniques and research that have been in highlights like the K-anonymity, l-diversity, generalization, clustering and randomization techniques, but most of these techniques is not comprehensive and the chances to lose the information is still high and may cause privacy leakage on the original data. The contribution of this research is the hybrid technique in anonymization process that will improve the protection and the privacy of data. With this better and comprehensive solution, it will decrease the loss of information. There are four major phases in this methodology as research guidance. The first phase is an overview of the entire research process and the second phase is the description of the anonymization process and techniques. It will be followed by the third phase of describing the design and module of the system, and the fourth phase is the researcher highlights on the comparison methods that are designed in this study. The researcher stated that there are two main contributions in this research. The first contribution is to introduce a new technique to anonymize the network data using the hybrid technique; and for the second contribution, the researcher creates a profile of a hybrid anonymization technique based on K-anonymity, l-diversity, generalization, clustering and randomization techniques. It is quite difficult to identify the best technique of anonymization process. Due to this, the researcher provides the details of analyzing, summarizing and profiling of the anonymization techniques. The researcher realizes that there are a few opportunities to advance this research within this domain in the near future, such as implementing a real-time based in anonymization process. Unfortunately, this type of processing needs to be revamped from the architectural design until the data processing part; and it is more thought-provoking if it were implemented in a real-time based or in the batch processing process, if the variable of the optimization is to be used in the anonymization process. Apart from that, the profiling of the anonymization processing techniques will also help the researcher to propose a generalization technique that might be implemented to anonymize data either using the micro or the network data. UTeM 2016 Thesis NonPeerReviewed text en http://eprints.utem.edu.my/id/eprint/18567/1/Hybrid%20Anonymization%20Technique%20For%20Improving%20The%20Privacy%20In%20Network%20Data%2024%20Pages.pdf text en http://eprints.utem.edu.my/id/eprint/18567/2/Hybrid%20Anonymization%20Technique%20For%20Improving%20The%20Privacy%20In%20Network%20Data.pdf Abd Rahim, Yahaya (2016) Hybrid Anonymization Technique For Improving The Privacy In Network Data. Doctoral thesis, Universiti Teknikal Malaysia Melaka. http://library.utem.edu.my:8000/elmu/index.jsp?module=webopac-d&action=fullDisplayRetriever.jsp&szMaterialNo=0000100862 HF5351.M34 2016 |
| spellingShingle | Q Science (General) QA76 Computer software Abd Rahim, Yahaya Hybrid Anonymization Technique For Improving The Privacy In Network Data |
| title | Hybrid Anonymization Technique For Improving The Privacy In Network Data |
| title_full | Hybrid Anonymization Technique For Improving The Privacy In Network Data |
| title_fullStr | Hybrid Anonymization Technique For Improving The Privacy In Network Data |
| title_full_unstemmed | Hybrid Anonymization Technique For Improving The Privacy In Network Data |
| title_short | Hybrid Anonymization Technique For Improving The Privacy In Network Data |
| title_sort | hybrid anonymization technique for improving the privacy in network data |
| topic | Q Science (General) QA76 Computer software |
| url | http://eprints.utem.edu.my/id/eprint/18567/1/Hybrid%20Anonymization%20Technique%20For%20Improving%20The%20Privacy%20In%20Network%20Data%2024%20Pages.pdf http://eprints.utem.edu.my/id/eprint/18567/2/Hybrid%20Anonymization%20Technique%20For%20Improving%20The%20Privacy%20In%20Network%20Data.pdf |
| url-record | http://eprints.utem.edu.my/id/eprint/18567/ http://library.utem.edu.my:8000/elmu/index.jsp?module=webopac-d&action=fullDisplayRetriever.jsp&szMaterialNo=0000100862 HF5351.M34 2016 |
| work_keys_str_mv | AT abdrahimyahaya hybridanonymizationtechniqueforimprovingtheprivacyinnetworkdata |