A Novel Approach of Privacy Preserving Data With Anonymizing Tree Structure
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 8
Abstract
Data anonymization techniques have been proposed in order to allow processing of personal data without compromising user’s privacy. the data management community is facing a big challenge to protect personal information of individuals from attackers who try to disclose the information. So data anonymization strategies have been proposed so as to permit handling of individual information without compromising user’s privacy. Data anonymization is a type of information sanitization whose intent is privacy protection. It is the process of either encrypting or removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous. We are presenting k(m;n)-anonymity privacy guarantee which addresses background knowledge of both value and structure using improved and automatic greedy algorithm. (k (m,n) - obscurity ensure) A tree database D is considered k (m,n) - unknown if any assailant who has foundation information of m hub names and n auxiliary relations between them (ancestor descendant), is not ready to utilize this learning to distinguish not as much as k records in D. A tree dataset D can be transformed to a dataset D0 which complies to k (m,n) - anonymity, by a series of transformations.The key idea is to replace rare values with a common generalized value and to remove ancestor descendant relations when they might lead to privacy breaches.
Authors and Affiliations
E. Lohitha| M.Tech (CSE), Lingayas Institute Of Management And Technology, A.P., India, Khaleelullah . Shaik| Assistant Professor, Dept. of Computer Science & Engineering, Lingayas Institute Of Management And Technology, A.P., India
Modeling And Biomechanical Analysis Of Human Knee Joint
The main objective of the present work is to implement the computer aided technology to study the biomechanical behavior of human knee joint which consists of Femur, Tibia, Patella, Menisci, Posterior Cruciate Ligame...
Efficient Scheme For Payment Minimization And Qos Services To Clients In Cloud
A new technique namely payment minimization error-tolerant algorithm which reduces the payment to clients is proposed in this paper.From cloud organization suppliers' perspective, advantage is a champion amongst the...
A Novel System for Privacy-Preserving Access Control for Relational Data with Accuracy
Access Control is a set of controls to restrict access to certain resources. If we think about it, access controls are everywhere around us. A door to your room, the guards allowing you to enter the office building o...
A Novel Approach of Privacy Preserving Data With Anonymizing Tree Structure
Data anonymization techniques have been proposed in order to allow processing of personal data without compromising user’s privacy. the data management community is facing a big challenge to protect personal inform...
Investment Casting Of Torpedo Nozzle
Investment Casting is also known as Lost Wax process. Investment casting process is generally used to produce intricate and complex shaped products. The primary objective of the project work is to produce Torpedo Noz...