Multiple-Published Tables Privacy-Preserving Data Mining: A Survey for Multiple-Published Tables Techniques
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 6
Abstract
With large growth in technology, reduced cost of storage media and networking enabled the organizations to collect very large volume of information from huge sources. Different data mining techniques are applied on such huge data to extract useful and relevant knowledge. The disclosure of sensitive data to unauthorized parties is a critical issue for organizations which could be most critical problem of data mining. So Privacy preserving data mining (PPDM) has become increasingly popular because it solves this problem and allows sharing of privacy sensitive data for analytical purposes. A lot of privacy techniques were developed based on the k-anonymity property. Because of a lot of shortcomings of the k-anonymity model, other privacy models were introduced. Most of these techniques release one table for research public after they applied on original tables. In this paper the researchers introduce techniques which publish more than one table for organizations preserving individual's privacy. One of this is (a, k) – anonymity using lossy-Join which releases two tables for publishing in such a way that the privacy protection for (a, k)-anonymity can be achieved with less distortion, and the other one is Anatomy technique which releases all the quasi-identifier and sensitive values directly in two separate tables, met l-diversity privacy requirements, without any modification in the original table.
Authors and Affiliations
Abou_el_ela Hussein, Nagy Darwish, Hesham Hefny
A Solution for the Uniform Integration of Field Devices in an Industrial Supervisory Control and Data Acquisition System
Supervisory Control and Data Acquisition (SCADA) systems are increasingly used solutions for monitoring and controlling various industrial processes. The existence of a large number of communication protocols helps to de...
E-learning System Which Allows Students’ Confidence Level Evaluation with Their Voice When They Answer to the Questions During Achievement Tests
E-learning system which allows students’ confidence level evaluation with their voice when they answer to the question during achievement tests is proposed. Through experiments of comparison of students’ confidence level...
Wireless Multimedia Sensor Networks based Quality of Service Sentient Routing Protocols: A Survey
Improvements in nanotechnology have introduced contemporary sensory devices that are capable of gathering multimedia data in form of images, audio and video. Wireless multimedia sensor networks are designed to handle suc...
A Format-Compliant Selective Encryption Scheme for Real-Time Video Streaming of the H.264/AVC
H.264 video coding standard is one of the most promising techniques for the future video communications. In fact, it supports a broad range of applications. Accordingly, with the continuous promotion of multimedia servic...
Development of a Two Factor Authentication for Vehicle Parking Space Control based on Automatic Number Plate Recognition and Radio Frequency Identification
This paper proposed a two factor authentication for vehicle access controls using Automatic Number Plate Recognition (ANPR) and Radio Frequency Identification system (RFID) for the University of Zambia (UNZA) vehicle acc...