Privacy and Utility in Data Publishing with Full Functional Dependencies
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 5
Abstract
A number of methods have recently been proposed for privacy preserving data mining of multidimensional data records. One of the methods for privacy preserving data mining is that of anonymization, in which a record is released only if it is indistinguishable from k other entities in the data. Data publishing has generated much concern on individual privacy. Recent work has shown that different background knowledge can bring various threats to the privacy of published data. We distinguish the safe FFDs that will not jeopardize privacy from the unsafe ones. We design robust algorithms that can efficiently anonymize the microdata with low information loss when the unsafe FFDs are present. Our results clarify several common misconceptions about data utility and provide data publishers useful guidelines on choosing the right tradeoff betweenprivacy and utility
Authors and Affiliations
P. V. N. Prasoona#1 , M. Vasumathi Devi*2 and K. V. Narasimha Reddy
STONE WASTE AS A GROUNDBREAKING CONCEPTION FOR THE LOW COST CONCRETE
Stone wastes are generated as a waste during the process of cutting and polishing. Stone industry produces large amounts of Stone waste which causes environmental problems. To produce low cost concrete by replacing...
Radio Resource Scheduling in 3GPP LTE: A Review
Long Term Evolution (LTE) ,proposed by 3rd Generation Partnership Project (3GPP) as a 3.9G technology, represents a very promising answer to the ever rising bandwidth demand of mobile applications. To support vast...
Study on Environmental impact on oil and gas activities in Ghana- Analysis by graphical approaches using Matlab
Environmental impacts are main factor in any country. This paper is focused about various types of impacts on oil and gas activities carried over in Ghana. We are studied different results for aquatic impacts on di...
Solving Combined Economic and Emission Dispatch using Cuckoo Search
This paper presents an application of a new metaheuristic approach called Cuckoo Search (CS) for solving Multiobjective CEED problem. Combined Economic and Emission Dispatch problem determines optimum power generat...
Implementation of TPA and Data Integrity in Cloud Computing using RSA Algorithm
Cloud infrastructure has been envisioned as the next-generation construction of IT Initiative. It passages the application software and databases to the integrated large data hubs, where the administration of the data an...