A Personalized Anonymization Technique Based On An Aggregate Formulation Implemented In Polynomial Time

Abstract

Differential Privacy makes available a conjectural formulation for solitude that guarantees that the system basically performs the identical way despite of whether any personality is incorporated in the database. In this paper, we deal with both scalability and privacy risk of data anonymization. We recommend a scalable algorithm that meets differential privacy when be appropriate an explicit random sampling. Make known the minimum amount of information or no information at all is undeniable more than ever when organizations try to look after the seclusion of individuals. To accomplish such a purpose, the organizations naturally try to hide from view the uniqueness of an individual to whom data pertains and affect a set of transformations to the micro data previous to liberate it.

Authors and Affiliations

Y Srinivas, D Srinivas

Keywords

Related Articles

Hash Function based MAC Protocol to cope with MAC Layer Misbehavior in Manets

Mobile adhoc networks consist of mobile nodes connected by wireless links without using any preexisting infrastructure. MANET nodes rely on network cooperation schemes to properly work, forward traffic unrelated to it...

A Stochastic Model to Evaluate The Performance of An IAAS Cloud System

Cloud systems are different from usual distributed systems.First of all; they are branded by an extremely big numeral of resources that can distance different administrative domains. Presentation assessment of cloud...

A Survey on Distributed Network Services Using SSO for Secure Mechanism

Methodologies presently use in single sign-on (SSO) for enable a legal user with a single credential to be authenticated by a multiple service providers in a distributed computer network. The earlier techniques cause...

Implementation and Analysis of Image Contrast Enhancement using Gaussian Mixture Model

In this paper, we propose a new global contrast enhancement algorithm using the histogram color and depth images. On the basis of the histogram-modification framework, the color and depth image histograms are first p...

Outsourced Similarity Search on Metric Data Assets

Similarity querying of metric data which is stored in cloud is outsourced to a service provider. The data is to be revealed only to trusted users, not to the service provider or anyone else. Users query the server fo...

Download PDF file
  • EP ID EP28248
  • DOI -
  • Views 265
  • Downloads 3

How To Cite

Y Srinivas, D Srinivas (2015). A Personalized Anonymization Technique Based On An Aggregate Formulation Implemented In Polynomial Time. International Journal of Research in Computer and Communication Technology, 4(9), -. https://europub.co.uk/articles/-A-28248