Skip to main content

Anonymization Techniques

  • Living reference work entry
  • First Online:
Encyclopedia of Big Data
  • 273 Accesses

Synonyms

Anonymous data; Data anonymization; Data privacy; De-Identification; Personally identifiable information

Introduction

Personal information is constantly being collected on individuals as they browse the internet or share data electronically. This collection of information has been further exacerbated with the emergence of the Internet of things and the connectivity of many electronic devices. As more data is disseminated into the world, interconnected patterns are created connecting one data record to the next. The massive data sets that are collected are of great value to businesses and data scientists alike. To properly protect the privacy of these individuals, it is necessary to de-identify or anonymize the data. In other words, personally identifiable information (PII) needs to be encrypted or altered so that a person’s sensitive data remains indiscernible to outside sources and readable to the pre-approved parties. Some popular anonymization techniques include noise...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Further Reading

  • Dwork, C. (2006). Differential privacy. In Automata, languages and programming. Berlin: Springer.

    Google Scholar 

  • Li, Ninghui, et al. (2007). t-Closeness: Privacy beyond k-anonymity and l-diversity. IEEE 23rd International Conference on Data Engineering, 7.

    Google Scholar 

  • Machanavajjhala, A., et al. (2007). l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data, 1(1), Article 3, 1–12.

    Google Scholar 

  • Sweeney, L. (2002). k-anonymity: A Model for Protecting Privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5).

    Google Scholar 

  • The European Parliament and of the Council Working Party. (2014). Opinion 05/2014 on anonymisation techniques. http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp216_en.pdf. Retrieved on 29 Dec 2014.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mick Smith .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this entry

Cite this entry

Smith, M., Agrawal, R. (2017). Anonymization Techniques. In: Schintler, L., McNeely, C. (eds) Encyclopedia of Big Data. Springer, Cham. https://doi.org/10.1007/978-3-319-32001-4_9-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-32001-4_9-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-32001-4

  • Online ISBN: 978-3-319-32001-4

  • eBook Packages: Springer Reference Business and ManagementReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences

Publish with us

Policies and ethics