Dynamic Approach for Secure Data Publishing in Mining
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 8
Abstract
More than a few anonymization techniques, such as simplification and bucketization, have been deliberate for privacy protecting micro data publishing. Current work has shown that generalization loses substantial quantity of in sequence, particularly for high-dimensional data. Bucketization, on the other offer, does not put off membership revelation and does not apply for data that do not have a clear partition between quasi- recognizing attributes and perceptive attributes. In this nearby a novel technique called slicing, which partitions the information both horizontally and vertically? We demonstrate that slicing conserves better data effectiveness than simplification and can be used for association revelation protection. Another significant benefit of slicing is that it can handle high-dimensional data. Slicing can be used for attribute revelation protection and develop an efficient algorithm for computing the sliced data that go behind the ℓ-diversity requirement. The workload experiments confirm that slicing preserves better utility than generalization and is more effective than bucketization in workloads connecting the sensitive attribute. Our research also demonstrates that slicing can be used to prevent membership disclosure.
Authors and Affiliations
M. Janardhan, T. Manjula
http://www.ijrcct.org/index.php/ojs/article/download/1245/pdf
It is pleasing to offer differentiated access services such thatdata access policies are distinct over user attributes or roles,which are direct by the key authorities. We propose a securedata recovery scheme using C...
Analytical view of de-noising methods in ECG signals
This paper deals with the study of ECG signals signal energy, information entropy and joint entropy were analyzed to introduce general selective method of wavelet basis function, and these methods was applied in slow...
A Spatial Domain Approach for Digital Image Watermarking Exploiting Colour Spaces
In the era of digital technology, there is an imperative need to protect the ownership of digital information. Watermarking is one of the processes of embedding information in a cover object so as to prove the ownersh...
Design of The CAN Bus Booster Pack and The Implementation of The CAN Protocol on the TIVA C Launch pad Evaluation Board
This paperis about the practical design of a CAN Bus Boosterpack and the implementation of the CAN protocol on the TIVA C Launchpad evaluation board. The boosterpack board contains a CAN transceiver that can make com...
An Overview of Holistic Face Recognition
Biometric is including two parts bios (life) and metrikos (measure). This word comes from Greek. A biometric system is essentially a pattern recognition system that recognizes a person based on a feature vector derive...