Implementation of Slicing Technique for Privacy Preserving Data Publishing
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 12
Abstract
Today, most of the organizations are effectively gathering and storing information in extensive databases. A large number of them have perceived the potential estimation of this information as a data hotspot for settling on business choices. Protection saving information distributed (PPDP) gives systems and devices to distributed helpful data while safeguarding information security. In this paper, a short yet precise audit of a few Anonymization strategies, for example, speculation and Bucketization, have been intended for security saving micro information distributed. Late work has demonstrated that speculation loses impressive measure of data, particularly for high-dimensional information. Then again, Bucketization does not avoid participation exposure. Though cutting jelly preferred information utility over speculation furthermore anticipates enrollment revelation. This paper concentrates on compelling strategy that can be utilized for giving better information utility and can deal with high dimensional information.
Authors and Affiliations
Konda Tadisetti, P. Madhuri, J. Bheemeswara Shastri
Impact of DDOS Attacks on Cloud Environment
Cloud Computing is an emerging area nowadays. Researchers are working on all aspects of cloud viz. cloud network architecture, scheduling policies, virtualization, hypervisor performance scalability, I/O efficiency, d...
Measures To Enforce Safety In Digital Libraries
The Digital Library System is an Innovation in Library Service.It is prone to Onslaughts of sabotage by Bibliophiles, Bibliophobes and Biblioklepts all alike the system itself inherent facilities which render it susce...
Optical Internet Security: A new Time based threat identification and its prevention
Optical Internet (OI), which are driving the demand for increased transmission rates and bandwidth – hungry applications and its services using dedicated optical routers. To cater this huge bandwidth demand, Transmis...
Information Density Cache Strategy in Wireless Ad-Hoc Networks
Data caching strategy for ad hoc networks whose nodes exchange information items in a peer to peer fashion. Data caching is a fully distributes scheme where each node upon receiving request information determines the...
Algorithmic Procedure to Produce Near Optimal Interactivity And Reduce The Interaction Time Between Clients
Latency-driven distribution of servers is necessary even when there are no limits on the ease of use of server income at one location. In a distributed server structural design, the state of a DIA such as the effecti...