A Personalized Anonymization Technique Based On An Aggregate Formulation Implemented In Polynomial Time

Abstract

Differential Privacy makes available a conjectural formulation for solitude that guarantees that the system basically performs the identical way despite of whether any personality is incorporated in the database. In this paper, we deal with both scalability and privacy risk of data anonymization. We recommend a scalable algorithm that meets differential privacy when be appropriate an explicit random sampling. Make known the minimum amount of information or no information at all is undeniable more than ever when organizations try to look after the seclusion of individuals. To accomplish such a purpose, the organizations naturally try to hide from view the uniqueness of an individual to whom data pertains and affect a set of transformations to the micro data previous to liberate it.

Authors and Affiliations

Y Srinivas, D Srinivas

Keywords

Related Articles

A New Approach to Increase the Efficiency of Classical Approach In Designing Management Information Systems (MIS’S)

Classical approach is one of information systems methodologies that are used to design and build the management information systems (MIS’s), it always uses the all five stages in its life cycle during the design of (...

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

A mobile ad hoc network is self configuring, resource poor and has dynamically changing topology. Keeping in view these constraints and complexity number of routing protocols are proposed. The most popular protocols...

Effective Load Balancing Technique And Memory Management In Cloud

Cloud computing applications are developed using Map Reduce programming. Cloud computing distributed file system nodes perform functionality like computing as well as storage in this a file is partitioned into a numb...

Impact of DDOS Attacks on Cloud Environment

Cloud Computing is an emerging area nowadays. Researchers are working on all aspects of cloud viz. cloud network architecture, scheduling policies, virtualization, hypervisor performance scalability, I/O efficiency, d...

Cybernetic Technology Utility: Scrupulous Heroes v. Unscrupulous Individuals – Ending Corruption in SA

Corruption on South African (SA) roads is so overwhelming that it has reached such proportions where some motorists now see it as the only way to go. On the contrary, things seem to have started turning the other way...

Download PDF file
  • EP ID EP28248
  • DOI -
  • Views 248
  • Downloads 3

How To Cite

Y Srinivas, D Srinivas (2015). A Personalized Anonymization Technique Based On An Aggregate Formulation Implemented In Polynomial Time. International Journal of Research in Computer and Communication Technology, 4(9), -. https://europub.co.uk/articles/-A-28248