Anonymizied Approach to Preserve Privacy of Published Data Through Record Elimination
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Data mining is the process of analyzing data. Data Privacy is collection of data and dissemination of data. Privacy issues arise in different area such as health care, intellectual property, biological data, financial transaction etc. It is very difficult to protect the data when there is transfer of data. Sensitive information must be protected. There are two kinds of major attacks against privacy namely record linkage and attribute linkage attacks. Research have proposed some methods namely k-anonymity, ℓ-diversity, t-closeness for data privacy. K-anonymity method preserves the privacy against record linkage attack alone. It is unable to prevent address attribute linkage attack. ℓ-diversity method overcomes the drawback of k-anonymity method. But it fails to prevent identity disclosure attack and attribute disclosure attack. t-closeness method preserves the privacy against attribute linkage attack but not identity disclosure attack. A proposed method used to preserve the privacy of individuals’ sensitive data from record and attribute linkage attacks. In the proposed method, privacy preservation is achieved through generalization by setting range values and through record elimination. A proposed method overcomes the drawback of both record linkage attack and attribute linkage attack
Authors and Affiliations
Sakshi Agrawal
A Review: Hadoop Storage and Clustering Algorithms
Abstract : In the last few years there has been voluminous increase in the storing and processing of data, which require convincing speed and also requirement of storage space. Big data is a defined as large, diverseand...
Texture Analysis As An Aid In CAD And Computational Logic
Abstract: The thought to utilize composition examination in restorative imaging has been considered followingthe mid-1970s. Then again, the energizing advancement of both surface investigation calculations and PCinnovati...
Adaptive Steganography Based Enhanced Cipher HidingTechnique for Secure Data Transfer
Abstract:There have been enormous number of attacks recorded during electronic transmission of informationbetween the source and intended receiver and indeed this has called for a more robust and efficient method f...
Message Passing Algorithm: A Tutorial Review
This tutorial paper reviews the basics of error correcting codes like linear block codes and LDPC. The error correcting codes which are also known as channel codes enable to recover the original message from the...
A Smart and Wearable Cardiac Healthcare System with Monitoring of Sudden Fall for Elderly and Post-Operative Patients
Abstract: The dominance of chronic diseases, driven by an increasingly aging population with a new health paradigm that emphasizes early finding, early diagnosis and early treatment, is highly recommended. Especially, Ca...