Anonymization Techniques for Privacy Preservation of published Data
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2015, Vol 3, Issue 4
Abstract
In today’s world data is collected for various purposes. The collected data includes personal details or some other confidential information. Database is a collection of data that can be accessed, updated and it enables user to retrieve data. Providing security to these databases is big issue now days. Today online information is stored for almost everything like-Online admission, online banking, online shopping, E-Health service and social networking etc. This information can be used by insurance companies, drug manufacturing companies and various other marketing agencies without consent of the data provider. To maintain confidentiality, unauthorized third parties must be prevented from accessing and viewing data. It is also essential to maintain database integrity while data is transferring from source to destination. Suppose the data owner wants to share the data with researchers or analysts, how can a data owner technically insure that the individuals who are the subjects of the data cannot be re- identified while the data remain practically useful? Various anonymization techniques, like suppression, generalization and bucketization are designed for preserving privacy of published data. Generalization loses significant amount of information especially for large volume of data and bucketization is not sufficient prevent membership disclosure and cannot be used for data where quasi-identifying attributes and sensitive attributes cannot be clearly separated. . Slicing is new privacy preserving technique which provides improved data utility than generalization and is more efficient in workload pertaining to the sensitive attribute
Authors and Affiliations
Vidya Ingle
Effective Stochastic Decoding Method for Electronic Medical In-formation Sharing
Several IoT solutions have emerged as a result of the industry's massive expansion. E-health has the potential to provide high-quality, accessible treatment. ' It's a challenge to keep the user 's private medical file sa...
Meta-Modeling of AI for Software Modularization
Recent developments in artificial intelligence have surprisingly been only on the machine-learning related technologies. This growing trend brings new hardships to the already problematic AI programming sector that looks...
Brain Haemorrhage Detection using LSTM, Convolution Neural Network and CT Scan Images
A brain hemorrhage is an eruption of the brain's arteries brought on by either excessive blood pressure or blood coagulation, which may result in fatalities or serious injuries. It is the kind of medical emergency that r...
Multi-Objective Transportation Problem Under Fuzziness with S-type Membership Function
Transportation problem is a key optimization technique used these days for planning, especially, to minimize the cost. As a fact, in case of emergency, instead of cost the time plays an important role. Several researcher...
An Improved Dynamic Round Robin CPU Scheduling Algorithm Using SJF Technique
CPU Scheduling is one of the fundamental concepts of operating system. There exists a number of CPU scheduling algorithms like first come f irst serve, shortest job first scheduling, round robin scheduling, priority sche...