Dynamic Approach for Secure Data Publishing in Mining

Abstract

More than a few anonymization techniques, such as simplification and bucketization, have been deliberate for privacy protecting micro data publishing. Current work has shown that generalization loses substantial quantity of in sequence, particularly for high-dimensional data. Bucketization, on the other offer, does not put off membership revelation and does not apply for data that do not have a clear partition between quasi- recognizing attributes and perceptive attributes. In this nearby a novel technique called slicing, which partitions the information both horizontally and vertically? We demonstrate that slicing conserves better data effectiveness than simplification and can be used for association revelation protection. Another significant benefit of slicing is that it can handle high-dimensional data. Slicing can be used for attribute revelation protection and develop an efficient algorithm for computing the sliced data that go behind the ℓ-diversity requirement. The workload experiments confirm that slicing preserves better utility than generalization and is more effective than bucketization in workloads connecting the sensitive attribute. Our research also demonstrates that slicing can be used to prevent membership disclosure.

Authors and Affiliations

M. Janardhan, T. Manjula

Keywords

Related Articles

Phishing Detection In Selected Feature Using Modified SVM-PSO

The sensitive information such as passwords, credit card number, account details, email information and credential of the external users robbed by threats such kind of threat is called phishing. So many softwareand t...

Enhance The Performance Of Mobile Presence Services By Scalable Server Architecture (Presence Cloud)

A mobile existence overhaul is a necessary constituent of a social network application as it uphold each mobile user’s presence information such as the current status, GPS location and network address. Also updates t...

Measures To Enforce Safety In Digital Libraries

The Digital Library System is an Innovation in Library Service.It is prone to Onslaughts of sabotage by Bibliophiles, Bibliophobes and Biblioklepts all alike the system itself inherent facilities which render it susce...

Faults Identification by Passing Test Packets Through Efficient Tool In Network

ATPG comprehends router designs and produces a device autonomous model. The reproduction is utilized to deliver a base arrangement of test packets to negligibly put into impact each connection in the network or maxim...

Routing Problem: MANET And Ant Colony Algorithm

Mobile ad hoc network (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any centralized administration and the biggest challenge in MANETs is to find a path b...

Download PDF file
  • EP ID EP27970
  • DOI -
  • Views 250
  • Downloads 0

How To Cite

M. Janardhan, T. Manjula (2014). Dynamic Approach for Secure Data Publishing in Mining. International Journal of Research in Computer and Communication Technology, 3(8), -. https://europub.co.uk/articles/-A-27970