Database Privacy- Issues and Solutions
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 4
Abstract
Data Mining, fourth and analytical step of Knowledge discovery in database process is a process of discovering new and interesting patterns in the large datasets. For example, data miner can derive different patterns based on age, countries or continents on HIV-AIDS if they get suitable dataset to be mined. However, data publishing publish some sensitive information which can lead to chaos, e.g. if data is published as such then HIV effected people loose their privacy .The challenge for data publisher is to publish the data in a form that is most suitable in terms of utility and anonymity. Motivation of this paper comes from the challenges that data publisher face and benefits that data miner can get from data publishing. The aim of this pa-per is to make data publishers way simple enough so that Data Miner or Adversary cannot extract sensitive information out of the dataset. Minimizing the tradeoff between anonymizing and utility of dataset is the primary objective. The method used to accomplish the stated objective is anonymization of raw data using various Privacy Models.
Authors and Affiliations
Jyoti Devi , Kavita , VikasMalik
A Comparative Study of Various Network Simulation Tools
In the area of network research, establishing a network in a real time scenario is very difficult. A single test bed takes a large amount of time and cost. Thus a network simulator tool helps the network developer to che...
Genetic Approach to Find Optimal Moves for Prisoner Dilemma Game
The Prisoner‘s Dilemma, a simple two-person game invented by Merrill Flood & Melvin Dresher in the 1950s, has been studied extensively in Game Theory. Till now the work has been done to study the environment in which...
Applications of Finite Automata in Lexical Analysis and as a Ticket Vending Machine – A Review
In this paper, we explain the two applications of finite automata. First is about the first phase of a compiler design called as lexical analysis. The lexical analysis used to identify the token with its type. Second is...
A SURVEY ON INFRASTRUCTURE ABSTRACTION OF WIRELESS SENSOR NETWORK
Wireless Sensor Network (WSN) is an autonomous sensor. Several abstractions are harnessed to ease out the difficult WSN application development. Various parameters have been developed to satisfy the different requirement...
Comparative Study of Reactive/On Demand Routing Protocols for Mobile Adhoc Network
In an ad hoc network, mobile nodes communicate with each other using multi-hop wireless links. There is no stationary infrastructure such as base stations. The routing protocol must be able to keep up with the high degre...