A Personalized Anonymization Technique Based On An Aggregate Formulation Implemented In Polynomial Time

Abstract

Differential Privacy makes available a conjectural formulation for solitude that guarantees that the system basically performs the identical way despite of whether any personality is incorporated in the database. In this paper, we deal with both scalability and privacy risk of data anonymization. We recommend a scalable algorithm that meets differential privacy when be appropriate an explicit random sampling. Make known the minimum amount of information or no information at all is undeniable more than ever when organizations try to look after the seclusion of individuals. To accomplish such a purpose, the organizations naturally try to hide from view the uniqueness of an individual to whom data pertains and affect a set of transformations to the micro data previous to liberate it.

Authors and Affiliations

Y Srinivas, D Srinivas

Keywords

Related Articles

Design and Development of Multitasking Robot

A method for integrating real time obstacle avoidance capability in two-legged walking robots i.e.Biped using parallel leg mechanism. Elaborating the way of different task assign to a robot i.e., introducing a multit...

Energy Efficient Group Key Management For Secure Data Processing In Ad hoc Networks

The key management is the course of action of maintaining the secret key between the sender and receiver. By means of this key the sender can encrypt the data which is broadcasted to the receiver and send it with the...

Query Clustering method to User profiles

The User profiling is a fundamental component of any personal applications. The several existing user profiling strategies are based on the objects of users are interested in positive references but not negative pref...

A Privacy-Preserving Personalized Web Search Framework Ups To Generalize Profiles According To User-Specified Privacy Requirements

Personalized web search (PWS) is a universal group of search techniques aim at as long as better search results which are adapted for individual user needs. As the expense user information has to be together and anal...

A Formal Study of Cryptanalysis on Ciphers

Cryptanalysis is co-study of cryptography. A cipher is said to be successful cipher if it design resists all cipher attacks. Cryptanalyis are two-fold. One way is a benign activity where cryptanalysis is performed to...

Download PDF file
  • EP ID EP28248
  • DOI -
  • Views 253
  • Downloads 3

How To Cite

Y Srinivas, D Srinivas (2015). A Personalized Anonymization Technique Based On An Aggregate Formulation Implemented In Polynomial Time. International Journal of Research in Computer and Communication Technology, 4(9), -. https://europub.co.uk/articles/-A-28248