K-Anonymization Techniques for Hiding Multi-Sensitive Information
Journal Title: Scholars Journal of Engineering and Technology - Year 2017, Vol 5, Issue 6
Abstract
Securing information protection is an imperative issue in microdata distribution. Anonymity strategies regularly mean to ensure singular security, with insignificant effect on the nature of the discharged information. As of late, a couple of models are acquainted with guarantee the security ensuring or potentially to diminish the data misfortune to such an extent as could be allowed. That is, they additionally enhance the adaptability of the anonymous system to make it all the more near reality, and after that to meet the various needs of the general population. Different proposition and calculations have been intended for them in the meantime. In this paper, we present two anonymization techniques for adding vertices and edges for hiding useful information. The algorithm for adding edges executes faster as compared to algorithm for adding vertices but hiding information capability is more in vertices adding algorithm because it add vertices implied that it also add edges so it becomes more robust. Keywords: Anonymity techniques, anonymity models, privacy preserving algorithm.
Authors and Affiliations
Anisha Tiwari, Minu Choudhary
Investigation of Thermal Efficiency and Heat Flux Analysis of a Tube Boiller Used in Boiling Palm Nuts
Abstract:Heat energy and heat energy generation become significant in manufacturing, production and processing processes. Heat management is needed to avoid wastage of human efforts, cost implication, material sources ne...
Existence of Positive Solution for Nonlinear Third-Order Boundary Value Problem
The nonlinear third-order boundary value problem is studied in this work, where .The existence result of at least one positive solution to above third-order boundary value problem is obtained by using fixed point i...
Optimization of Process Parameters for the Ultimate Tensile Strength of Aluminium Alloy Sand Castings using Taguchi Method
An optimization technique for sand casting process parameters based on the Taguchi method is reported in this paper. While keeping some casting parameters constant, aluminium alloy castings were prepared by sand casting...
Hybrid Scheme: Two Factor Authentication using Graphical password with Pass point scheme in Cloud computing
Cloud Computing is a completely new concept in the research area. Cloud computing focuses new challenging security threat. Hacking and data leakage are the common threats in cloud computing. As the security due to hacker...
Design and Development of Inverted Down Draft Gasifier for Cooking Purpose
Energy is a key input for technological, industrial, social and economical development of a nation. However, a large number of consumers in domestic, agricultural, commercial and industrial sectors are faced with a situa...