An overview of Multiplicative data perturbation for privacy preserving Data mining
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 7
Abstract
Privacy is an important issue when one wants to make use of data that involves individuals’ sensitive information. Research on protecting the privacy of individuals and the confidentiality of data has received contributions from many fields, including computer science, statistics, economics, and social science. In this paper, we survey research work in privacypreserving data Mining. This is an area that attempts to answer the problem of how an organization, such as a hospital, government agency, or insurance company, can release data to the public without violating the confidentiality of personal information. We focus on privacy criteria that provide formal safety guarantees, present algorithms that sanitize data to make it safe for release while preserving useful information, and discuss ways of analyzing the sanitized data. Many challenges still remain. This overview provides a summary of the current and traditional multiplicative data perturbation techniques for privacy preserving Data Mining.
Authors and Affiliations
Keerti Dixit, Bhupendra Pandya
Analysis of Multiband Patch Antenna Using Coaxial Feed and Microstrip Line Feed
In this paper the analysis of hybrid shape multiband microstrip patch antenna is presented which uses FR-4 substrate and have thickness of 2.4mm. Firstly results are produced using coaxial probe feed. Minkowski Fractal...
TPC for Industrial Wireless Instrumentation
The adoption of wireless technology for industrial wireless instrumentation requires high-quality communication performance. The use of transmission power control (TPC) can help address industrial issues concerning ener...
Implementation on- Crowd Wisdom Management
Many online users with different backgrounds commonly use mobile social networking i.e. connect with one another through their different devices like PC, mobiles, tablet that can be use for purpose of crowdsourcing. As...
Data Transmission Using Barcode Modulation Technique
The concept of Barcode is of great relevance for use in wireless data transmission between hand held device . In a typical setup, any file on a cell phone, for example, can be transferred to a second cell phone through...
A Novel Full-Bridge PWM Dc�Dc Converter with Energy Recovery Turn-Off Snubber
This paper presents a full bridge pulse-width modulated dc-dc converter with controlled secondary side rectifier using a novel non dissipative energy recovery turn-off snubber, and an innovative control algorithm to ach...