Privacy Preserving Data Publishing: Using Overlapping Slicing and Attribute
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 2, Issue 3
Abstract
Privacy preserving publishing is the kind of techniques to apply privacy to collected vast amount of The data publication processes are today still very difficult. Data often contains personally identifiable information and therefore releasing such data may result in privacy breaches; this is the case for the examples of microdata, e.g., census data and medical data. The proposed techniques in this project accelerate accessing speed of user as well as applying privacy to collected data. Several anonymization techniques were designed for privacy preserving data publishing. Recent work in data publishi information, especially for high dimensional data. Bucketization, on the other hand, does not prevent membership disclosure. I propose an overlapping slicing method for handling high into more than one column, we protect privacy by breaking the association of uncorrelated attributes and preserve data utility by preserving the association between highly correlated attributes. This technique releases mo correlations thereby, overlapping slicing preserves better data utility than generalization and is more effective than bucketization in workloads involving the sensitive attribute
Authors and Affiliations
Lavanya
Performance Analysis and Air Flow Optimization of Radiator Using Simulation
Automotive engine cooling system takes care of excess heat produced during engine operation. It Regulates Engine surface temperature for engine optimum efficiency. Recent advancement in engine for power forced eng...
ON PRIME SUBMODULES IN WEAK MULTIPLICATION MODULES
Throughout this article, all rings will be treated as communicative with non zero identity and all modules will be treated as unitary modules. In this paper, some results have been given on prime sub modules in we...
Effect of Thermal Diffusion and Heat Absorption on an Unsteady MHD Flow Past a Flat Plate in Presence of Viscous Dissipation
The present work is devoted to the numerical study of the effect of Heat absorption and thermal diffusion on an unsteady magnetohydrodynamic(MHD) flow of a viscous incompressible and electrically conducting fluid...
Anonymity Set Location Privacy Scheme in Manet
In hostile environments, the adversary can launch traffic analysis against intercept able routing information embedded in routing messages and data packets. The adversaries on tracing network routes and inferring...
TLS: Improving Security for Ad-Hoc Networks using Three Level Security Mechanism
A group of large autonomous wireless nodes are connected and communicating in a P2P method on a Heterogeneous environment without defined infrastructure is named Mobile Ad-hoc network. Various mechanisms and tech...