Method To Prevent Re-Identification Of Individual Nodes By Combining K-Degree Anonymity With L-Diversity

Abstract

A range of privacy models as well as anonymization algorithms have been developed. In tabular micro data some of the no responsive attributes called quasi identifiers can be used to reidentify individuals and their sensitive attributes. When publishing social network data graph structures are also published with equivalent social relationships. As a result it may be oppressed as a new means to compromise privacy. ITH the rapid growth of social networks such as Face book and LinkedIn more and more researchers establish that it is a great opportunity to get hold of useful information from these social network data such as the user behavior, community growth, disease spreading etc. Though it is supreme that published social network data should not disclose private information of individuals. Therefore how to protect individual’s privacy and at the same time protect the utility of social network data becomes a challenging topic. In this paper we believe a graph model where each highest point in the graph is associated with a sensitive label.

Authors and Affiliations

Sri M. Vamsi Krishna| Dept. of CSE, Chaitanya Institute of Science & Tech., Madhavapatnam, Kakinada E.g.dt, AP, India, Dr. K. V. V. S. Narayana Murthy| Dept. of CSE, Chaitanya Institute of Science & Tech., Madhavapatnam, Kakinada E.g.dt, AP, India, Ch. Srinu| Dept. of CSE, Chaitanya Institute of Science & Tech., Madhavapatnam, Kakinada E.g.dt, AP, India

Keywords

Related Articles

Fortification Support Access Control Manipulate Procedure Intended For Relational Data

Present days majorly concentrated on meticulous speculation on data. Access control systems are every time touch with Safe and secrecy maintenance of data but now a days hackers acting like reliance. Then they are re...

Implementation of An Efficient Gate Level Modified Square-Root Carry Select Adder Using HDL

Contribution of this work is reduce the area and power of the CSLA by a simple gate level modification. Based on this modification CSLA architecture have been developed and compared with the regular SQRT CSLA archite...

AODV with DSR Protocol Heirarchy For Packet Dropped Forgery Attacks

Far reaching scale sensor frameworks are sent in different application spaces, and the data they accumulate are used as a piece of essential initiative for fundamental structures. Data are spilled from different sour...

PV Active Power Filter Combination Supplies Power To Non Linear Load

These days the photovoltaic (PV) era is progressively step by step, while the normal loads require all the more high-control quality. Essentially, one PV generator providing to nonlinear loads is wanted to be coordin...

Novel Visual Authentication Protocols to Defend Key Logging Issues

The best approach to accomplish secure correspondence is to have validation convention, which is a sort of cryptographic convention with the reason for confirming substances. The configuration of secure validation co...

Download PDF file
  • EP ID EP16382
  • DOI -
  • Views 323
  • Downloads 13

How To Cite

Sri M. Vamsi Krishna, Dr. K. V. V. S. Narayana Murthy, Ch. Srinu (2014). Method To Prevent Re-Identification Of Individual Nodes By Combining K-Degree Anonymity With L-Diversity. International Journal of Science Engineering and Advance Technology, 2(11), 742-745. https://europub.co.uk/articles/-A-16382