 
          An International Publisher for Academic and Scientific Journals
      Author Login 
      
    Scholars Journal of Engineering and Technology | Volume-5 | Issue-06
        A Review on K-Anonymization Techniques
        Anisha Tiwari, Minu Choudhary
        
            Published:  June 30, 2017 | 
             239
             263
        
        DOI:  10.21276/sjet
        Pages:  238-245
        Downloads
        
        Abstract
        Securing information protection is an imperative issue in microdata distribution. Anonymity strategies
regularly mean to ensure singular security, with insignificant effect on the nature of the discharged information. As of
late, a couple of models are acquainted with guarantee the security ensuring or potentially to diminish the data misfortune
to such an extent as could be allowed. That is, they additionally enhance the adaptability of the anonymous system to
make it all the more near reality, and after that to meet the various needs of the general population. Different proposition
and calculations have been intended for them in the meantime. In this paper a review of anonymity techniques for
privacy preserving. In this paper, the discussion about the anonymity models, the significant execution ways and the
techniques of anonymity algorithm, and also analyzed their strength and limitations.
    

