An International Publisher for Academic and Scientific Journals
Author Login 
Scholars Journal of Engineering and Technology | Volume-5 | Issue-06
A Review on K-Anonymization Techniques
Anisha Tiwari, Minu Choudhary
Published: June 30, 2017 | 123 152
DOI: 10.21276/sjet
Pages: 238-245
Downloads
Abstract
Securing information protection is an imperative issue in microdata distribution. Anonymity strategies regularly mean to ensure singular security, with insignificant effect on the nature of the discharged information. As of late, a couple of models are acquainted with guarantee the security ensuring or potentially to diminish the data misfortune to such an extent as could be allowed. That is, they additionally enhance the adaptability of the anonymous system to make it all the more near reality, and after that to meet the various needs of the general population. Different proposition and calculations have been intended for them in the meantime. In this paper a review of anonymity techniques for privacy preserving. In this paper, the discussion about the anonymity models, the significant execution ways and the techniques of anonymity algorithm, and also analyzed their strength and limitations.