Method To Prevent Re-Identification Of Individual Nodes By Combining K-Degree Anonymity With L-Diversity
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 11
Abstract
A range of privacy models as well as anonymization algorithms have been developed. In tabular micro data some of the no responsive attributes called quasi identifiers can be used to reidentify individuals and their sensitive attributes. When publishing social network data graph structures are also published with equivalent social relationships. As a result it may be oppressed as a new means to compromise privacy. ITH the rapid growth of social networks such as Face book and LinkedIn more and more researchers establish that it is a great opportunity to get hold of useful information from these social network data such as the user behavior, community growth, disease spreading etc. Though it is supreme that published social network data should not disclose private information of individuals. Therefore how to protect individual’s privacy and at the same time protect the utility of social network data becomes a challenging topic. In this paper we believe a graph model where each highest point in the graph is associated with a sensitive label.
Authors and Affiliations
Sri M. Vamsi Krishna| Dept. of CSE, Chaitanya Institute of Science & Tech., Madhavapatnam, Kakinada E.g.dt, AP, India, Dr. K. V. V. S. Narayana Murthy| Dept. of CSE, Chaitanya Institute of Science & Tech., Madhavapatnam, Kakinada E.g.dt, AP, India, Ch. Srinu| Dept. of CSE, Chaitanya Institute of Science & Tech., Madhavapatnam, Kakinada E.g.dt, AP, India
Wind Energy Conversion Systems using DFIG with Integrated Active Filter Capabilities
Doubly Fed Induction Generator for Wind Energy Conversion Systems manages the operation of doubly nourished acceptance generator with an incorporated dynamic channel capacities utilizing network side converter (GSC)....
Providing Distinguish Access Levels to Encrypted Cloud Databases
Outsourcing sensitive and crucial data in the hands of a cloud provider should come with the guarantee of security and seamless availability for data at rest, in motion, and in use. Several alternatives exist for sto...
Transparent User Authentication Using Biometric Traits for Secure Internet Services
In this innovation time security of electronic applications is a genuine worry, because of the late increment in the recurrence and many-sided quality of digital assaults, biometric methods offer developing answer fo...
A Deniable Cp-Abe Scheme For An Audit-Free Cloud Storage Service
To brawl against outside coercion, we meant to build an encryption scheme that could help cloud storage providers keep away from this quandary. In our move toward, we present cloud storage providers means to create f...
Efficiency of Text Mining of Accident Narratives By Accessing Predictive Performance
This work portrays the utilization of content mining with a mix of methods to naturally find accident attributes that can educate a superior comprehension of the supporters of the accidents. The review assesses the v...