Implementation of K-Anonymity Using Android SDK

M Sheshikala, RV Prakash… - 2017 IEEE 7th …, 2017 - ieeexplore.ieee.org
2017 IEEE 7th International Advance Computing Conference (IACC), 2017ieeexplore.ieee.org
Privacy preserving of personal data is done by many techniques like k-anonymity, l-diversity,
t-closeness etc., but the techniques proposed are implemented only when there is the
availability of a laptop or a computer. Now-a-days people are interested to carry a mobile
instead of a lab-top, because some of the works done by a lap-top can also be done by a
mobile, like files sharing, images and videos sharing, and many more, but the sharing may
lose the privacy of the data. With a specific end goal to give the protection to the information …
Privacy preserving of personal data is done by many techniques like k-anonymity, l-diversity, t-closeness etc., but the techniques proposed are implemented only when there is the availability of a laptop or a computer. Now-a-days people are interested to carry a mobile instead of a lab-top, because some of the works done by a lap-top can also be done by a mobile, like files sharing, images and videos sharing, and many more, but the sharing may lose the privacy of the data. With a specific end goal to give the protection to the information the strategy k-anonymity is utilized, which chooses the k-esteem where at any rate k-1 people whose data additionally shows up in the discharge. This technique is implemented using Android SDK. Whenever the user requests the information, instead of sending original information, the data is sent in an anonymized way. This paper presents the implementation of this technique and results are shown.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果