Work place: School of Computing Sciences and Engineering, VIT University, Vellore-632014, India
E-mail: dpacharjya@gmail.com
Website: https://scholar.google.com/citations?user=j0IPMsUAAAAJ&hl=en
Research Interests: Analysis of Algorithms, Algorithm Design, Knowledge Management, Formal Methods, Mathematics of Computing
Biography
D. P. Acharjya, received M. Sc. from NIT, Rourkela, India; M. Tech. in computer science from Utkal University, India and obtained his Ph. D. from Berhampur University, India. He has been awarded with Gold Medal in M. Sc. He is presently working as a Professor in the School of Computing Sciences and Engineering at VIT University, India. He has authored many international and national papers and four books to his credit. In addition, he has edited two books with IGI Global, USA. Dr. Acharjya is associated with many professional bodies CSI, ISTE, IMS, AMTI, ISIAM, OITS, IACSIT, CSTA and IAENG.
By Geetha Mary A D.P. Acharjya N. Ch. S. N. Iyengar
DOI: https://doi.org/10.5815/ijcnis.2014.06.02, Pub. Date: 8 May 2014
In this modern era of computing, information technology revolution has brought drastic changes in the way data are collected for knowledge mining. The data thus collected are of value when it provides relevant knowledge pertaining to the interest of an organization. Therefore, the real challenge lies in converting high dimensional data into knowledge and to use it for the development of the organization. The data that is collected are generally released on internet for research purposes after hiding sensitive information in it and therefore, privacy preservation becomes the key factor for any organization to safeguard the internal data and also the sensitive information. Much research has been carried out in this regard and one of the earliest is the removal of identifiers. However, the chances of re-identification are very high. Techniques like k-anonymity and l-diversity helps in making the records unidentifiable in their own way, but, these techniques are not fully shielded against attacks. In order to overcome the drawbacks of these techniques, we have proposed improved versions of anonymization algorithms. The result analysis show that the proposed algorithms are better when compared to existing algorithms.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals