De-Identification Technology Involves Web Mining

Abstract

Many data owners are required to release variety of data in real world application it has vital importance of discovery valuable information stay behind the data. However existing we focus on the de- identification policy which is the common privacy preserving approach. By using de-identification policy a continues balance between privacy protection and data utility can be achieved by choosing the appropriate. We propose one parallel algorithm œSKY FILTER POLICY GENERATOR that can be filtered the optimized data web ranking algorithm provide the user preferred data. Each user has their own privacy username and password, through the sky filter (data analytic operator) user willing data given to the user. Each user is identified by de identification policy. G. Sneka | H. Sharmila | R. Banumathi"De-Identification Technology Involves Web Mining" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11484.pdf http://www.ijtsrd.com/engineering/computer-engineering/11484/de-identification-technology-involves-web-mining/g-sneka

Authors and Affiliations

Keywords

Related Articles

A Study on Perception of Parents on Mid Day Meal Scheme Among Slum Communities of Delhi

The National Programme for Nutritional Support to Primary Education was started in 1995. Also popularly known as the Mid-Day Meal Scheme (MDMS), was limited to providing dry rations. It was year 2001, when the Supreme Co...

A Comparative Study of Schools under Government and Private Management with Respect to Academic Achievement and School Resources at Secondary Stage of Education

One of the most enduring questions in educational research is how and sometimes even whether, the resources provided to schools relate to student achievement. This question has been summarized into the seemingly simple q...

Design and Evaluation of Scheduling Architecture for IEEE 802.16 in Mobile Ad Hoc Network

A worldwide demand for high speed broadband wireless systems across commercial and residential regions is emerging rapidly due to the increasing reliance on web for information, business, entertainment and new upcoming h...

Does Firms Size Matter An Empirical Evidence from Non Financial Institutions NFIS Listed on the Ghana Stock Exchange GSE

The aim of this research was to explore the connection between the firm size and the profitability of Ghana Stock Exchange GSE listed non financial companies. The research used panel data obtained from 15 listed non fina...

TJBOT An Open Source Cardboard Robot

TJBOT is an interactive Open Source robot which is designed to encourage All individuals to build TJBOT in fun way with cognitive services. Where TJBOT can be 3D printed and which comes with set of recipes from which we...

Download PDF file
  • EP ID EP360076
  • DOI -
  • Views 73
  • Downloads 0

How To Cite

(2018). De-Identification Technology Involves Web Mining. International Journal of Trend in Scientific Research and Development, 2(3), -. https://europub.co.uk/articles/-A-360076