De-Identification Technology Involves Web Mining

Abstract

Many data owners are required to release variety of data in real world application it has vital importance of discovery valuable information stay behind the data. However existing we focus on the de- identification policy which is the common privacy preserving approach. By using de-identification policy a continues balance between privacy protection and data utility can be achieved by choosing the appropriate. We propose one parallel algorithm œSKY FILTER POLICY GENERATOR that can be filtered the optimized data web ranking algorithm provide the user preferred data. Each user has their own privacy username and password, through the sky filter (data analytic operator) user willing data given to the user. Each user is identified by de identification policy. G. Sneka | H. Sharmila | R. Banumathi"De-Identification Technology Involves Web Mining" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11484.pdf http://www.ijtsrd.com/engineering/computer-engineering/11484/de-identification-technology-involves-web-mining/g-sneka

Authors and Affiliations

Keywords

Related Articles

Observations of can Bus Control System

One of the important criteria of the modern cars is digital control of the vehicle. Because of the quick development of embedded technology, the high performance embedded processor is inserted into auto industry it has l...

A Study on "Measuring Job Satisfaction Level of Employees" With Reference to Tirumala Milk Products (P) Ltd

Study has been showed in order to censoriously assess and observe the level of employees"™ satisfaction as well as the influences of dissatisfaction among the employees of Tirumala Milk Products (P) Ltd. The purpose of t...

E-Mail Security Algorithm to Filter Out Spam E-mails using Machine Learning

Email has turned out to be a standout amongst the most essential types of correspondence. Lately, everybody utilizes email. Ordinary billions of messages are being passed around and many spam messages are additionally se...

Civil War in Syria and Libya after Arab Spring

The wave of Arab Spring which started from Tunisia at the ending of 2010, by a young graduate and vegetable vender, and after setting himself on the fire due to harassment and insult by a police women, after suicide by t...

Plastic Wastes as Partial Replacement of Conventional Natural Aggregates

Concrete is the most widely used construction material in todays world. It is very difficult to point out another material of construction as versatile as concrete. It is a material of choice where strength, durability,...

Download PDF file
  • EP ID EP360076
  • DOI -
  • Views 52
  • Downloads 0

How To Cite

(2018). De-Identification Technology Involves Web Mining. International Journal of Trend in Scientific Research and Development, 2(3), -. https://europub.co.uk/articles/-A-360076