DISCLOSURE PREVENTION IN PRIVACY-PRESERVING DATA PUBLISHING
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 3
Abstract
The advancement of information technologies has enabled various organizations (e.g., census agencies, hospitals) to collect large volumes of sensitive personal data (e.g., census data, medical records. Data in its original form, however, typically contains sensitive information about individuals, and publishing such data will violate individual privacy. The current practice in data publishing relies mainly on policies and guidelines as to what types of data can be published and on agreements on the use of published data. In order to protect sensitive information, the simplest solution is not to disclose the information. However, this would be overkill since it will hinder the process of data analysis over the data from which we can find interesting patterns. Moreover, in some applications, the data must be disclosed under the government regulations.Alternatively, the data owner can first modify the data such that the modified data can guarantee privacy and, at the same time, the modified data retains sufficient utility and can be released to other parties safely. This process is usually called as privacy-preserving data publishing. This thesis identifies a collection of privacy threats in real lifedatapublishing, and presents a unified solution to address these threats.
Authors and Affiliations
V. Kavitha
Time Dependent Quadratic Demand Inventory Models when Delay in Payments is Acceptable
An EOQ model is constructed for deteriorating items with time dependent quadratic demand rate. It is assumed that the deterioration rate is constant and the supplier offers his retailer the credit period to set...
Hydrological Modeling of Upper Indus Basin and Assessment of Deltaic Ecology
Managing water resources is mostly required at watershed scale where the complex hydrology processes and interactions linking land surface, climatic factors and human activities can be studied. Geographical Informat...
An Enhanced Security System for Web Authentication
Web authentication has low security in these days. Todays, For Authentication purpose, Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from...
Crack Detection of Ferromagnetic Materials through Non Destructive Testing Methodology
The real components have so many defects in the material, which acts as a crack. In fact, manufacturing of a component is not ideal. In manufacturing several kinds of defects are generated like voids and inclusio...
On some locally closed sets and spaces in Ideal Topological Spaces
In this paper we introduce and characterize some new generalized locally closed sets known as δˆ s-locally closed sets and spaces are known as δˆ s-normal space and δˆ s-connected space and discussed some of their proper...