A Personalized Anonymization Technique Based On An Aggregate Formulation Implemented In Polynomial Time
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 9
Abstract
Differential Privacy makes available a conjectural formulation for solitude that guarantees that the system basically performs the identical way despite of whether any personality is incorporated in the database. In this paper, we deal with both scalability and privacy risk of data anonymization. We recommend a scalable algorithm that meets differential privacy when be appropriate an explicit random sampling. Make known the minimum amount of information or no information at all is undeniable more than ever when organizations try to look after the seclusion of individuals. To accomplish such a purpose, the organizations naturally try to hide from view the uniqueness of an individual to whom data pertains and affect a set of transformations to the micro data previous to liberate it.
Authors and Affiliations
Y Srinivas, D Srinivas
A Reliable implementation of Security-Enabled Architecture with area optimized symmetric Cryptography
My project specifies a symmetric Cryptography technique which provides same keys to Cipher and Decipher to transfer the information for reducing the design complexity and AES (Advanced Encryption Standard) which prov...
The Feasibility of Content Sharing With (Dtn) On Commercial Smart Phones
The increase in the number of smart phone users has lead to the increase in the peer-topeer adhoc content sharing. Traditional data delivery schemes are not suitable for such networks due to intermittent connectivity...
Sprinkling Data Prevents From Intruders
The habitual communication of delay-tolerantnetwork (DTN) model is having partial infrastructural model for prevailing mobile patronsfor instance Bluetooth and Wi-Fi Direct. Mobile ad hoc network is an anthology of mo...
Relative Reference Measure for Hierarchical Document Clustering
Clustering is a foremost concept in data mining. Clustering usually require a measure that needs to be computed among the clustering objects this measure could be either a similarity or a dissimilarity measure, here...
Ensuring Data Sender Privacy And Reduce Communication&Computation Overhead In WSN
Wireless sensor system is an accumulation of sensor hubs .These sensor hubs sense information to base station when occasion is recognized. Attackers infusing fake messages aggravating the information conveyance in WS...