A Personalized Anonymization Technique Based On An Aggregate Formulation Implemented In Polynomial Time
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 9
Abstract
Differential Privacy makes available a conjectural formulation for solitude that guarantees that the system basically performs the identical way despite of whether any personality is incorporated in the database. In this paper, we deal with both scalability and privacy risk of data anonymization. We recommend a scalable algorithm that meets differential privacy when be appropriate an explicit random sampling. Make known the minimum amount of information or no information at all is undeniable more than ever when organizations try to look after the seclusion of individuals. To accomplish such a purpose, the organizations naturally try to hide from view the uniqueness of an individual to whom data pertains and affect a set of transformations to the micro data previous to liberate it.
Authors and Affiliations
Y Srinivas, D Srinivas
Sensors Based Automated Wheelchair
This proposed method is mainly useful for handicapped persons who are suffering with Parkinson’s disease or physically disabled or paralytic patients. These type of persons are cannot move their own. They always depe...
Protective Speculation Clouds With Valuable Cost
In this paper, we propose Protective Speculation Clouds With Valuable Cost constraint based approach to identify which datasets need to be encrypted and which do not, so that privacy preserving cost can be saved whil...
Vertical And Horizontal Partition Of Microdata For Publishing Through Privacy
Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving micro data publishing. Recent work has shown that generalization loses considerable amount of info...
High Performance of Fault Detection And Correction Technique Using Difference Set Codes For Memory Applications
The advanced combination technologies made it possible for accessing any device so fast that within a portion of seconds the job can be performed. Now days fast memories exists everywhere during accessing if any erro...
Low Power 10 PAM Transmitter Using Mixed Signal Design Approach
The mixed signal design approach for 10- level pulse amplitude modulation (10-PAM) transmitter which transmit 4-bit per symbol. The frequency is reduced thereby the power dissipation is greatly reduced. The data rate...