Dynamic Approach for Secure Data Publishing in Mining

Abstract

More than a few anonymization techniques, such as simplification and bucketization, have been deliberate for privacy protecting micro data publishing. Current work has shown that generalization loses substantial quantity of in sequence, particularly for high-dimensional data. Bucketization, on the other offer, does not put off membership revelation and does not apply for data that do not have a clear partition between quasi- recognizing attributes and perceptive attributes. In this nearby a novel technique called slicing, which partitions the information both horizontally and vertically? We demonstrate that slicing conserves better data effectiveness than simplification and can be used for association revelation protection. Another significant benefit of slicing is that it can handle high-dimensional data. Slicing can be used for attribute revelation protection and develop an efficient algorithm for computing the sliced data that go behind the ℓ-diversity requirement. The workload experiments confirm that slicing preserves better utility than generalization and is more effective than bucketization in workloads connecting the sensitive attribute. Our research also demonstrates that slicing can be used to prevent membership disclosure.

Authors and Affiliations

M. Janardhan, T. Manjula

Keywords

Related Articles

Hybrid SVM Data mining Techniques for Weather Data Analysis of Krishna District of Andhra Region

Weather Prediction is the application of science and technology to estimate the state of atmosphere at a particular spatial location. Due to the availability of huge data researchers got interest to analyze and forec...

Design and Development of Multitasking Robot

A method for integrating real time obstacle avoidance capability in two-legged walking robots i.e.Biped using parallel leg mechanism. Elaborating the way of different task assign to a robot i.e., introducing a multit...

PARTIAL UPDATE ADAPTIVE TECHNIQUES FOR WIRELESS NETWORKS

An adaptive distributed strategy is developed based on incremental techniques. Distributed wireless sensor networks finds many remote sensing applications like battle field, surveillance, target localization, environ...

Transmission Power Control in Wireless ad hoc Networks

In ad hoc wireless networks packets are relayed over multiple hops to reach their destination. In order to operate ad hoc networks several protocols, for media access control, power control, routing, and transport ar...

Storage Correctness and Dynamic Data Support for Cloud Data

Cloud users store their data in the cloud environment which is privileged by the service provider. Cloud users can access their cloud storage. Cloud storage is a model with virtualized pools of storage which is genera...

Download PDF file
  • EP ID EP27970
  • DOI -
  • Views 215
  • Downloads 0

How To Cite

M. Janardhan, T. Manjula (2014). Dynamic Approach for Secure Data Publishing in Mining. International Journal of Research in Computer and Communication Technology, 3(8), -. https://europub.co.uk/articles/-A-27970