Multiple-Published Tables Privacy-Preserving Data Mining: A Survey for Multiple-Published Tables Techniques
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 6
Abstract
With large growth in technology, reduced cost of storage media and networking enabled the organizations to collect very large volume of information from huge sources. Different data mining techniques are applied on such huge data to extract useful and relevant knowledge. The disclosure of sensitive data to unauthorized parties is a critical issue for organizations which could be most critical problem of data mining. So Privacy preserving data mining (PPDM) has become increasingly popular because it solves this problem and allows sharing of privacy sensitive data for analytical purposes. A lot of privacy techniques were developed based on the k-anonymity property. Because of a lot of shortcomings of the k-anonymity model, other privacy models were introduced. Most of these techniques release one table for research public after they applied on original tables. In this paper the researchers introduce techniques which publish more than one table for organizations preserving individual's privacy. One of this is (a, k) – anonymity using lossy-Join which releases two tables for publishing in such a way that the privacy protection for (a, k)-anonymity can be achieved with less distortion, and the other one is Anatomy technique which releases all the quasi-identifier and sensitive values directly in two separate tables, met l-diversity privacy requirements, without any modification in the original table.
Authors and Affiliations
Abou_el_ela Hussein, Nagy Darwish, Hesham Hefny
The Adoption of Software Process Improvement in Saudi Arabian Small and Medium Size Software Organizations: An Exploratory Study
Quite a lot of attention has been paid in the literature on “how to adopt” software process improvement (SPI) in Small and Medium Size (SME) software organization in several countries. This has resulted in limited improv...
Energy Efficient Routing Protocol for Maximizing the Lifetime in Wsns Using Ant Colony Algorithm and Artificial Immune System
Energy limitations have become fundamental challenge for designing wireless sensor networks. Network lifetime represent the most important and interested metric. Several attempts have been made for efficient utilization...
A Proposed Textual Graph Based Model for Arabic Multi-document Summarization
Text summarization task is still an active area of research in natural language preprocessing. Several methods that have been proposed in the literature to solve this task have presented mixed success. However, such meth...
The Factors of Subjective Voice Disorder Using Integrated Method of Decision Tree and Multi-Layer Perceptron Artificial Neural Network Algorithm
The aim of the present study was to develop a prediction model for subjective voice disorders based on an artificial neural network algorithm and a decision tree using national statistical data. Subjects of analysis were...
Linear Prediction Model for Effort in Programming based on User Acceptance and Revised use Case Point Method
As long as most of the processes of verification and validation of software to grant acceptance by the customer/user, are subjective type, it is aimed to design a standard mathematical model with empirical to perform an...