
www.rsisinternational.org
INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XV, Issue IV, April 2026
ACKNOWLEDGEMENT
This research builds upon prior studies in the area of privacy-preserving data publishing. The authors sincerely
acknowledge and appreciate the contributions of researchers in this field, whose work provided the foundation
for the development of the proposed privacy-preserving data publishing algorithm.
Data Availability
The Adult dataset utilized in this study is publicly accessible through the University of California, Irvine
Machine Learning Repository and can be obtained at: http://archive.ics.uci.edu/ml
REFERENCES
1. L. Sweeney, “Simple demographics often identify people uniquely,” Health, vol. 671, pp. 1–34, 2000.
2. R. Chen, B. Fung, K. Wang, and P. Yu, “Privacy-preserving data publishing: A survey of recent
developments,” ACM Comput. Surv., vol. 42, no. 4, pp. 1–53, 2010.
3. S. Abdelhameed, M. Khalifa, and S. Moussa, “Privacy-preserving tabular data publishing: A
comprehensive evaluation from web to cloud,” Comput. Secur., vol. 72, pp. 74–95, 2017.
4. A. Meyerson and R. Williams, “On the complexity of optimal k-anonymity,” in Proc. ACM SIGMOD-
SIGACT-SIGART Symp. Principles Database Syst., pp. 223–228, 2004.
5. G. Aggarwal et al., “Approximation algorithms for k-anonymity,” J. Privacy Technol., vol. 2005, no. 1,
pp. 1–18, 2005.
6. C. C. Aggarwal, “On k-anonymity and the curse of dimensionality,” in Proc. VLDB, pp. 901–909, 2005.
7. European Parliament and Council, “Regulation (EU) 2016/679 (General Data Protection Regulation),”
Off. J. Eur. Union, L119, pp. 1–88, 2016.
8. Parliament of Ghana, Data Protection Act, 2012 (Act 843), 2012.
9. R. Liu and H. Wang, “Hiding outliers into crowd: Privacy-preserving data publishing with outliers,” Data
Knowl. Eng., vol. 100, pp. 94–115, 2015.
10. L. Sweeney, “k-anonymity: A model for protecting privacy,” Int. J. Uncertain. Fuzziness Knowl.-Based
Syst., vol. 10, no. 5, pp. 557–570, 2002.
11. C. Eyüpoğlu, B. C. Kara, and O. Karakuş, “(r, k, ε)-anonymization: Privacy-preserving data publishing
algorithm,” IEEE Access, vol. 13, pp. 70422–70435, 2025.
12. J. Gehrke et al., “ℓ-diversity: Privacy beyond k-anonymity,” ACM Trans. Knowl. Discov. Data, vol. 1,
no. 1, Art. 3, 2007.
13. N. Li, T. Li, and S. Venkatasubramanian, “t-closeness: Privacy beyond k-anonymity and ℓ-diversity,” in
Proc. IEEE ICDE, pp. 106–115, 2007.
14. C. Dwork, “Differential privacy,” in Automata, Languages and Programming (ICALP 2006), LNCS vol.
4052, pp. 1–12, 2006.
15. C. Eyüpoğlu and B. C. Kara, “Anonymization methods for privacy-preserving data publishing,” in Smart
Applications with Advanced Machine Learning, vol. 1, pp. 145–159, 2023.
16. D. J. DeWitt, K. LeFevre, and R. Ramakrishnan, “Mondrian multidimensional k-anonymity,” in Proc.
IEEE ICDE, p. 25, 2006.
17. P. Kalnis, N. Mamoulis, and M. Terrovitis, “Local and global recoding methods for anonymizing set-
valued data,” VLDB J., vol. 20, no. 1, pp. 83–106, 2011.
18. B. Kenig and T. Tassa, “A practical approximation algorithm for optimal k-anonymity,” Data Min.
Knowl. Discov., vol. 25, no. 1, pp. 134–168, 2012.
19. S. Karagiannis et al., “Mastering data privacy: Leveraging k-anonymity for robust health data sharing,”
Int. J. Inf. Secur., vol. 23, pp. 2189–2201, 2024.
20. Y. Chen et al., “An innovative k-anonymity privacy-preserving algorithm,” Comput. Mater. Continua,
vol. 79, no. 1, pp. 1561–1579, 2024.
21. M. Djoudi, L. Kacha, and A. Zitouni, “KAB: A new k-anonymity approach,” J. King Saud Univ. Comput.
Inf. Sci., vol. 34, no. 7, pp. 4075–4088, 2022.
22. J. Andrew and J. Karthikeyan, “Privacy-preserving big data publication: (k, l)-anonymity,” in
Intelligence in Big Data Technologies, pp. 77–88, 2021.