Method To Prevent Re-Identification Of Individual Nodes By Combining K-Degree Anonymity With L-Diversity
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 11
Abstract
A range of privacy models as well as anonymization algorithms have been developed. In tabular micro data some of the no responsive attributes called quasi identifiers can be used to reidentify individuals and their sensitive attributes. When publishing social network data graph structures are also published with equivalent social relationships. As a result it may be oppressed as a new means to compromise privacy. ITH the rapid growth of social networks such as Face book and LinkedIn more and more researchers establish that it is a great opportunity to get hold of useful information from these social network data such as the user behavior, community growth, disease spreading etc. Though it is supreme that published social network data should not disclose private information of individuals. Therefore how to protect individual’s privacy and at the same time protect the utility of social network data becomes a challenging topic. In this paper we believe a graph model where each highest point in the graph is associated with a sensitive label.
Authors and Affiliations
Sri M. Vamsi Krishna| Dept. of CSE, Chaitanya Institute of Science & Tech., Madhavapatnam, Kakinada E.g.dt, AP, India, Dr. K. V. V. S. Narayana Murthy| Dept. of CSE, Chaitanya Institute of Science & Tech., Madhavapatnam, Kakinada E.g.dt, AP, India, Ch. Srinu| Dept. of CSE, Chaitanya Institute of Science & Tech., Madhavapatnam, Kakinada E.g.dt, AP, India
A Structure of Adaptive Portable Video Streaming and Efficient Social Video Distribution in the Clouds
Recently there have been many studies on how to improve the service quality of mobile video streaming on cloud computing. Resilience against cloud provider failure and temporary unavailabilityUse multiple cloud provi...
The fundamental target of mathematics instruction is to invigorate one's instinct and logical point of view. Since the instinct is fuzzy, one can't be kept to two– esteemed logical considering. There ought to be som...
Combination Methodology For Protected Formal Deduplication In Cloud Computing
Data Deduplication is an significant method in favour get rid of redundant data as an alternative of captivating files, it provisions merely distinct copy of file. Among the entire organizations many organizations, s...
Study of Multi Layered Composite Shell With Shape Memory Alloy
The use of special composite materials has been continuously growing in recent years. Although many applications for composite materials include identified. general research is still being carried out in order to exp...
Key-Aggregate Model Search for Group Data Sharing Using PatientControlled Encryption In Cloud
Cloud storage has risen as a promising tackling an issue for giving universal, helpful, and onrequest gets to a lot of information shared over the Internet. Specifically, our plans give the main open key patient-contr...