Anonymization Techniques for Privacy Preservation of published Data
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2015, Vol 3, Issue 4
Abstract
In today’s world data is collected for various purposes. The collected data includes personal details or some other confidential information. Database is a collection of data that can be accessed, updated and it enables user to retrieve data. Providing security to these databases is big issue now days. Today online information is stored for almost everything like-Online admission, online banking, online shopping, E-Health service and social networking etc. This information can be used by insurance companies, drug manufacturing companies and various other marketing agencies without consent of the data provider. To maintain confidentiality, unauthorized third parties must be prevented from accessing and viewing data. It is also essential to maintain database integrity while data is transferring from source to destination. Suppose the data owner wants to share the data with researchers or analysts, how can a data owner technically insure that the individuals who are the subjects of the data cannot be re- identified while the data remain practically useful? Various anonymization techniques, like suppression, generalization and bucketization are designed for preserving privacy of published data. Generalization loses significant amount of information especially for large volume of data and bucketization is not sufficient prevent membership disclosure and cannot be used for data where quasi-identifying attributes and sensitive attributes cannot be clearly separated. . Slicing is new privacy preserving technique which provides improved data utility than generalization and is more efficient in workload pertaining to the sensitive attribute
Authors and Affiliations
Vidya Ingle
Older Adults Vs Middle-Aged Adults: Walking Velocity
The objective of the present study was to evaluate walking velocity of middle-age adults and older adults. Ten adults (5 middle age adults and 5 older adults) were recruited from a local community. They were all physical...
Fuzzy Modified TOPSIS for Supplier Selection Problem in Supply Chain Management
Nowadays, global market is highly competitive. Major part of the capital is spent on purchasing raw material/semi finished items. The strategic decision of supply chain is to minimize the expenses on the purchase of item...
Aspects to Consider While Developing Therapeutic Monoclonal Antibodies
Probably preponderance of exogenous protein therapeutics are still in the research phase. Numerous goods have been sold worldwide in 2006. The US Food and Drug Administration (FDA) has accepted an overwhelming amount of...
Antibody Engineering in Tumor Targeting and Intracellular Immunization and its Applications
Recombinant antibodies in last decade, engineering has arisen as the most promising options for creating, choosing, or synthesizing molecules for scientific investigations, therapeutics, and the medical establishment. In...
A Covert Channel Using Secret Splitting
This paper presents a design of a secure covert channel . The proposed system generates a special covert channel used in sensitive applications. In order to enhance the covert of information, the participants in the comm...