Implementation of Slicing Technique for Privacy Preserving Data Publishing

Abstract

Today, most of the organizations are effectively gathering and storing information in extensive databases. A large number of them have perceived the potential estimation of this information as a data hotspot for settling on business choices. Protection saving information distributed (PPDP) gives systems and devices to distributed helpful data while safeguarding information security. In this paper, a short yet precise audit of a few Anonymization strategies, for example, speculation and Bucketization, have been intended for security saving micro information distributed. Late work has demonstrated that speculation loses impressive measure of data, particularly for high-dimensional information. Then again, Bucketization does not avoid participation exposure. Though cutting jelly preferred information utility over speculation furthermore anticipates enrollment revelation. This paper concentrates on compelling strategy that can be utilized for giving better information utility and can deal with high dimensional information.

Authors and Affiliations

Konda Tadisetti, P. Madhuri, J. Bheemeswara Shastri

Keywords

Related Articles

A Formal Study of Cryptanalysis on Ciphers

Cryptanalysis is co-study of cryptography. A cipher is said to be successful cipher if it design resists all cipher attacks. Cryptanalyis are two-fold. One way is a benign activity where cryptanalysis is performed to...

Detection and Prevention Of Cooperative Black Hole Attack in a MANET

A mobile ad hoc network (MANET) is a selfconfiguring infrastructure-less network of mobile devices connected wirelessly. In MANETs, security plays a major role as the mobile nodes can join and leave the network random...

Biometric Security Techniques For IRIS Recognition System

Iris recognition is an automated method of biometric identification that uses mathematical patternrecognition techniques on video images of the irides of an individual's eyes, whose complex random patterns are unique...

Secured Architecture To Access Cloud Based Services

Cloud computing is new software IT revolution refers to the delivery of computer resources over the internet. Cloud storage is about much more than hosting online media. You need to deliver online media content, such...

Implementation of Slicing Technique for Privacy Preserving Data Publishing

Today, most of the organizations are effectively gathering and storing information in extensive databases. A large number of them have perceived the potential estimation of this information as a data hotspot for settl...

Download PDF file
  • EP ID EP28128
  • DOI -
  • Views 255
  • Downloads 1

How To Cite

Konda Tadisetti, P. Madhuri, J. Bheemeswara Shastri (2014). Implementation of Slicing Technique for Privacy Preserving Data Publishing. International Journal of Research in Computer and Communication Technology, 3(12), -. https://europub.co.uk/articles/-A-28128