An Effective Privacy Preservation Technique for Enhancing Data Usability

Year : 2025 | Volume : 12 | Issue : 03 | Page : 35 40
    By

    Dhananjay M. Kanade,

  • Shirish S. Sane,

  1. Research Scholar, Department of Computer Engineering, Karmaveer Kakasaheb Wagh Institute of Engineering Education and Research, Nashik, Savitribai Phule Pune University, Pune, Maharashtra, India
  2. Professor and Research Guide, Principal and Professor, Department of Computer Engineering, Gokhale Education Society’s R.H. Sapat College of Engineering, Management Studies and Research, Nashik, Maharashtra, India

Abstract

The rapid growth and adoption of modern database systems have created immense opportunities for researchers, industries, and organizations to extract meaningful knowledge and make data-driven decisions. While this progress has enabled the discovery of valuable patterns and trends, it has also intensified the challenge of safeguarding individual privacy. Merely removing direct identifiers such as names, social security numbers, or Aadhar card details is no longer sufficient, as adversaries can often exploit quasi-identifiers like gender, date of birth, and postal codes to re-identify individuals with alarming accuracy. To address these vulnerabilities, the field of Privacy-Preserving Data Publishing (PPDP) has emerged, offering techniques that attempt to strike a delicate balance between maintaining data utility and ensuring strong privacy guarantees. This study provides a detailed exploration of prominent PPDP models, including k-anonymity, ℓ-diversity, and t-closeness, while also reviewing newer strategies such as β-likeness and disassociation. Each method’s strengths, weaknesses, and real-world applicability are critically assessed. In addition, the study highlights the inherent trade-offs between data protection and usability, underlining the importance of adaptive, efficient, and context-aware solutions for secure data sharing in an era of growing privacy risks.

Keywords: Data anonymization, data utility, privacy-preserving data publishing (PPDP), general data protection regulation (GDPR)

[This article belongs to Recent Trends in Parallel Computing ]

How to cite this article:
Dhananjay M. Kanade, Shirish S. Sane. An Effective Privacy Preservation Technique for Enhancing Data Usability. Recent Trends in Parallel Computing. 2025; 12(03):35-40.
How to cite this URL:
Dhananjay M. Kanade, Shirish S. Sane. An Effective Privacy Preservation Technique for Enhancing Data Usability. Recent Trends in Parallel Computing. 2025; 12(03):35-40. Available from: https://journals.stmjournals.com/rtpc/article=2025/view=232644


References

  1. Vanichayavisalsakul P, Piromsopa K. An evaluation of anonymized models and ensemble classifiers. In Proceedings of the 2018 2nd international conference on big data and internet of things. 2018 Oct 24; 18–22.
  2. Sweeney L. k-anonymity: A model for protecting privacy. Int J Uncertain Fuzziness Knowl-Based Syst. 2002 Oct; 10(05): 557–70.
  3. Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M. l-diversity: Privacy beyond k-anonymity. ACM Trans Knowl Discov Data. 2007 Mar 1; 1(1): 3–es.
  4. Li N, Li T, Venkatasubramanian S. t-closeness: Privacy beyond k-anonymity and l-diversity. In 2007 IEEE 23rd international conference on data engineering. 2006 Apr 15; 106–115.
  5. Xie L, Lin K, Wang S, Wang F, Zhou J. Differentially private generative adversarial network. arXiv preprint arXiv:1802.06739. 2018 Feb 19.
  6. Kanade DM, Sane SS. Evaluating the Effectiveness of Clustering-Based K-Anonymity and KNN Cluster for Privacy Preservation. Int J Intell Syst Appl Eng. 2023 Sep. 6; 11(11s): 85–93. [cited 2025 Sep. 23]. Available from: https://ijisae.org/index.php/IJISAE/article/view/3437
  7. Reiter JP. Using CART to generate partially synthetic public use microdata. J Off Stat. 2005 Sep 1; 21(3): 441.
  8. Hittmeir M, Ekelhart A, Mayer R. On the utility of synthetic data: An empirical evaluation on machine learning tasks. In Proceedings of the 14th international conference on availability, reliability and security. 2019 Aug 26; 1–6.
  9. Majeed A, Lee S. Attribute susceptibility and entropy based data anonymization to improve users community privacy and utility in publishing data. Appl Intell. 2020 Aug; 50(8): 2555–74.
  10. Senosi A, Sibiya G. Classification and evaluation of privacy preserving data mining: a review. 2017 IEEE AFRICON. 2017 Sep 18; 849–55.

Regular Issue Subscription Review Article
Volume 12
Issue 03
Received 12/05/2025
Accepted 10/09/2025
Published 30/10/2025
Publication Time 171 Days


Login


My IP

PlumX Metrics