Data Anonymization Approach For Privacy Preserving In Cloud
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 4
Abstract
Private data such as electronic health records and banking transactions must be shared within the cloud environment to analysis or mine data for research purposes. Data privacy is one of the most concerned issues in big data applications, because processing large-scale sensitive data sets often requires computation power provided by public cloud services. A technique called Data Anonymization, the privacy of an individual can be preserved while aggregate information is shared for mining purposes. Data Anonymization is a concept of hiding sensitive data items of the data owner. A bottom-up generalization approach for transforming more specific data to less specific but semantically consistent data in order to preserve privacy. The idea is to explore the data generalization from data mining to hide detailed data, rather than discovering the patterns. When the data is masked, data mining techniques can be applied without modification.
Authors and Affiliations
Saranya M , Senthamil Selvi R
Implementation of Knowledge Mining with Ontology
Today, huge amount of data available on the web in the form of unstructured, semi-structured and unstructured data. With the use of ontology we can make structured data and use of knowledge mining. As, the knowledge mini...
Discrete & Continuous Mouse Motion Using Vocal & Non Vocal Characteristics of Human Voice.
Mouse control today has become an important tool to interact with computers. It is quite easy for those who are physically fit and mentally sound, but for those who are suffering from physical disabilities, It is quite d...
Fusing Fingerprint and Iris Multimodal Biometrics using Soft Computing Techniques
This paper presents the application of soft computing techniques in multimodal biometrics recognition. The paper investigates the comparative performance of three different approaches: nonoptimized neural network trained...
Multimodal Biometrics An Effective Approach of Person Identification : A Review
In new era, the biometric systems high security applications must match with perfect requirement of real world. This paper gives an overview of multimodal biometrics as well as different fusion of multiple biometrics whi...
Modelling and Performance Analysis of Personalized DSR Routing Protocol to discover a selfish and Inimical Node in MANETs Using NS-2
In this paper we activated the default dynamic source routing protocol with a selfish and inimical node and compared the performance of this code with default dynamic source routing protocol. The performance of this code...