Anonymizied Approach to Preserve Privacy of Published Data Through Record Elimination
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Data mining is the process of analyzing data. Data Privacy is collection of data and dissemination of data. Privacy issues arise in different area such as health care, intellectual property, biological data, financial transaction etc. It is very difficult to protect the data when there is transfer of data. Sensitive information must be protected. There are two kinds of major attacks against privacy namely record linkage and attribute linkage attacks. Research have proposed some methods namely k-anonymity, ℓ-diversity, t-closeness for data privacy. K-anonymity method preserves the privacy against record linkage attack alone. It is unable to prevent address attribute linkage attack. ℓ-diversity method overcomes the drawback of k-anonymity method. But it fails to prevent identity disclosure attack and attribute disclosure attack. t-closeness method preserves the privacy against attribute linkage attack but not identity disclosure attack. A proposed method used to preserve the privacy of individuals’ sensitive data from record and attribute linkage attacks. In the proposed method, privacy preservation is achieved through generalization by setting range values and through record elimination. A proposed method overcomes the drawback of both record linkage attack and attribute linkage attack
Authors and Affiliations
Sakshi Agrawal
Fast Compressed Sensing Based High Resolution Image Reconstruction
Abstract: As a powerful high resolution image modeling technique, compressive sensing (CS) has been successfully applied in digital image processing and various image applications. This paper proposes a new method of eff...
Digital Image Compression using Hybrid Transform with Kekre Transform and Other Orthogonal Transforms
This paper presents image compression technique using hybrid transform. Concept of hybrid wavelet transform can be extended to generate hybrid transform. In hybrid wavelet transform first few rows represent  ...
Sentiment Mining and Related Classifiers: A Review
Abstract: Brokers trading goods on the Web often seek for their customer’s reviews and feedbacks of their products and the associated services. With the growing popularity of e-commerce, the number of customer opinions t...
Context-Centred Mobile Applications Development For Effective Adoption Of Mobile Technology
Abstract: Recent approaches in mobile computing consider context to be central to the design and implementation of mobile applications. Context considerations enables the mobile application to respond to the needs and pu...
Using Aspect Ratio to Classify Red Blood Images
In automated medical diagnosis, shape plays a key role in image processing and pattern matching. In particular, microscopic visual examination, as used in this paper, extensively uses shape to diagnose anemia u...