Reference Hub3
Analytical Study on Privacy Attack Models in Privacy Preserving Data Publishing

Analytical Study on Privacy Attack Models in Privacy Preserving Data Publishing

Sowmyarani C. N., Dayananda P.
ISBN13: 9781522518297|ISBN10: 1522518290|EISBN13: 9781522518303
DOI: 10.4018/978-1-5225-1829-7.ch006
Cite Chapter Cite Chapter

MLA

Sowmyarani C. N., and Dayananda P. "Analytical Study on Privacy Attack Models in Privacy Preserving Data Publishing." Security Solutions and Applied Cryptography in Smart Grid Communications, edited by Mohamed Amine Ferrag and Ahmed Ahmim, IGI Global, 2017, pp. 98-116. https://doi.org/10.4018/978-1-5225-1829-7.ch006

APA

Sowmyarani C. N. & Dayananda P. (2017). Analytical Study on Privacy Attack Models in Privacy Preserving Data Publishing. In M. Ferrag & A. Ahmim (Eds.), Security Solutions and Applied Cryptography in Smart Grid Communications (pp. 98-116). IGI Global. https://doi.org/10.4018/978-1-5225-1829-7.ch006

Chicago

Sowmyarani C. N., and Dayananda P. "Analytical Study on Privacy Attack Models in Privacy Preserving Data Publishing." In Security Solutions and Applied Cryptography in Smart Grid Communications, edited by Mohamed Amine Ferrag and Ahmed Ahmim, 98-116. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-1829-7.ch006

Export Reference

Mendeley
Favorite

Abstract

Privacy attack on individual records has great concern in privacy preserving data publishing. When an intruder who is interested to know the private information of particular person of his interest, will acquire background knowledge about the person. This background knowledge may be gained though publicly available information such as Voter's id or through social networks. Combining this background information with published data; intruder may get the private information causing a privacy attack of that person. There are many privacy attack models. Most popular attack models are discussed in this chapter. The study of these attack models plays a significant role towards the invention of robust Privacy preserving models.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.