Method To Prevent Re-Identification Of Individual Nodes By Combining K-Degree Anonymity With L-Diversity

Abstract

A range of privacy models as well as anonymization algorithms have been developed. In tabular micro data some of the no responsive attributes called quasi identifiers can be used to reidentify individuals and their sensitive attributes. When publishing social network data graph structures are also published with equivalent social relationships. As a result it may be oppressed as a new means to compromise privacy. ITH the rapid growth of social networks such as Face book and LinkedIn more and more researchers establish that it is a great opportunity to get hold of useful information from these social network data such as the user behavior, community growth, disease spreading etc. Though it is supreme that published social network data should not disclose private information of individuals. Therefore how to protect individual’s privacy and at the same time protect the utility of social network data becomes a challenging topic. In this paper we believe a graph model where each highest point in the graph is associated with a sensitive label.

Authors and Affiliations

Sri M. Vamsi Krishna| Dept. of CSE, Chaitanya Institute of Science & Tech., Madhavapatnam, Kakinada E.g.dt, AP, India, Dr. K. V. V. S. Narayana Murthy| Dept. of CSE, Chaitanya Institute of Science & Tech., Madhavapatnam, Kakinada E.g.dt, AP, India, Ch. Srinu| Dept. of CSE, Chaitanya Institute of Science & Tech., Madhavapatnam, Kakinada E.g.dt, AP, India

Keywords

Related Articles

Enable Tpa To Perform Audits For Multiple Users Efficiently For Securing Cloud Storage

The concept of public audit capability has been planned in the conditions of make certain remotely stored data reliability under different system and security models. To fully make sure the data honesty and save the...

Dynamic Data Security Assurance In Cloud Computing

Dynamic data security assurance very difficult task in cloud worlds. In general we are using meta clouds for secure communication with secrecy of data management on clouds. But clouds are having heavy difficulties wi...

Adaptable conveyed administration uprightness verification for software as a service clouds

SaaS gives an adaptable situation through which application administration providers permitted to have their applications in a conveyed domain, with the goal that clients can get to the facilitated administrations in...

Carbon Nanotube based approach on FETs using Ternary Comparator

A Carbon Nanotube Field Effect Transistor (CNFET) is referred to as a FET that utilizes a single Carbon Nanotube or an array of carbon nanotubes as the channel material instead of bulk silicon in the traditional MOSF...

Co-ordinate Control for Fuel Cell And Photovoltaic Cell

The usual natural fuel energy resources such as petroleum, natural gas, and coal are getting shortage rapidly by fulfilling the high demand of the energy sector in the world. Also, affect the environment and leads to...

Download PDF file
  • EP ID EP16382
  • DOI -
  • Views 314
  • Downloads 13

How To Cite

Sri M. Vamsi Krishna, Dr. K. V. V. S. Narayana Murthy, Ch. Srinu (2014). Method To Prevent Re-Identification Of Individual Nodes By Combining K-Degree Anonymity With L-Diversity. International Journal of Science Engineering and Advance Technology, 2(11), 742-745. https://europub.co.uk/articles/-A-16382