Implementation of Slicing Technique for Privacy Preserving Data Publishing

Abstract

Today, most of the organizations are effectively gathering and storing information in extensive databases. A large number of them have perceived the potential estimation of this information as a data hotspot for settling on business choices. Protection saving information distributed (PPDP) gives systems and devices to distributed helpful data while safeguarding information security. In this paper, a short yet precise audit of a few Anonymization strategies, for example, speculation and Bucketization, have been intended for security saving micro information distributed. Late work has demonstrated that speculation loses impressive measure of data, particularly for high-dimensional information. Then again, Bucketization does not avoid participation exposure. Though cutting jelly preferred information utility over speculation furthermore anticipates enrollment revelation. This paper concentrates on compelling strategy that can be utilized for giving better information utility and can deal with high dimensional information.

Authors and Affiliations

Konda Tadisetti, P. Madhuri, J. Bheemeswara Shastri

Keywords

Related Articles

Effective Load Balancing Technique In Pcloud

In present days cloud computing is one of the greatest platform which provides storage of data in very lower cost and available for all time over the internet. But it has more critical issue like security, load manage...

Agile Software Development Teams on Autopoiesies Aspects

Self-organizing teams are at the spirit of agile software development. Self-organizing Agile teams are composed of individuals supervise their own workload shift work among themselves based on need and best fit and p...

Efficient Current Mode Multipliers in Signal Processing

This paper explains about the operation of the current mode multiplier circuits in signal processing. The multiplier/divider presents the advantage of very small linearity errors that can be obtained as a result of t...

Android Application on Examination Using Speech Technology for Blind People

A number of developing countries continue to provide educational services to students with disabilities in "segregated" schools. Trends in provisions in India reflect that the leading policy predisposition before the...

Two Techniques for Analyze Network Traffic to Identify Dos Attack

Highlights of the geometric relationships between the network traffic is not a perfect system functionality by taking out the correlation Multivariate analysis (MCA) is to show that the framework of a DoS attack. In...

Download PDF file
  • EP ID EP28128
  • DOI -
  • Views 228
  • Downloads 1

How To Cite

Konda Tadisetti, P. Madhuri, J. Bheemeswara Shastri (2014). Implementation of Slicing Technique for Privacy Preserving Data Publishing. International Journal of Research in Computer and Communication Technology, 3(12), -. https://europub.co.uk/articles/-A-28128