Privacy and Utility in Data Publishing with Full Functional Dependencies
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 5
Abstract
A number of methods have recently been proposed for privacy preserving data mining of multidimensional data records. One of the methods for privacy preserving data mining is that of anonymization, in which a record is released only if it is indistinguishable from k other entities in the data. Data publishing has generated much concern on individual privacy. Recent work has shown that different background knowledge can bring various threats to the privacy of published data. We distinguish the safe FFDs that will not jeopardize privacy from the unsafe ones. We design robust algorithms that can efficiently anonymize the microdata with low information loss when the unsafe FFDs are present. Our results clarify several common misconceptions about data utility and provide data publishers useful guidelines on choosing the right tradeoff betweenprivacy and utility
Authors and Affiliations
P. V. N. Prasoona#1 , M. Vasumathi Devi*2 and K. V. Narasimha Reddy
Observer Based Feedback Linearization Control of an Under-actuated Biped Robot
This paper deals with the design of a control strategy that combines a nonlinear observer and a partial feedback linearization controller to stabilize the periodic orbits of an under-actuated three link biped robot...
Performance Estimation of 2*4 MIMO-MC-CDMA Using Convolution Code in Different Modulation Technique using ZF Detection Scheme
In this paper we estimate the performance of 2*4 MIMO-MC-CDMA system using convolution code in MATLAB which highly reduces BER. MC-CDMA (Multi Carrier Code Division for Multiple Access) is a multi-user and multiple acces...
A Survey on Mobile Data Gathering in Wireless Sensor Networks - Bounded Relay
Most of the wireless sensor networks consist of static sensors, which can be deployed in a wide environment for monitoring applications. While transmitting the data from source to static sink, the amount of energy consum...
High Speed FIR Filter Based on Truncated Multiplier and Parallel Adder
High speed Finite Impulse Response filter (FIR) is designed using the concept of faithfully rounded truncated multiplier and parallel prefix adder. The bit width is also optimized without sacrificing the signal precision...
Mitigating Denial-of-Service Attacks Using Secure Service Overlay Model
Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks continue to threaten the reliability of networking systems. Previous approaches for protecting networks from DoS attacks are reactive in that they...