Preserve the Privacy of Anonymous and Confidential Database using K-anonymity

Abstract

In field of IT sector to maintain privacy and confidentiality of data is very important for decision making. So there is requirement of certain data to be published and exchanging of the information is in demand. The data to be exchanged contains sensitive information which moves around various parties and this may violate individual's privacy. So to preserve information in its accurate form while moving among various parties, my aim is to provide mechanism known as k_anonymous technique that doesn’t allow the unauthenticated user to modify the data. In this application two protocols that will solve this problem based on suppression and generalization k-anonymous and confidential databases are used. The protocols rely on well-known cryptographic assumptions, and it provides theoretical analyses to proof their experimental results to illustrate their efficiency.

Authors and Affiliations

Vishakha S. Kulkarni| M.E. Student, Dept. of Computer Science, Alard College of Engineering & Management, Pune, India, M. S. Gayathri| Asst.Professor, Dept.of Computer Science, Alard College of Engineering & Management, Pune, India

Keywords

Related Articles

The Effect of under Nutrition on Schooling, Adult Productivity and Economic Growth in South -West Madhya Pradesh, India

This study revealed the impact of malnutrition on schooling, learning and the lifetime earning potential of the child. For decades, south-west Madhya Pradesh (MP) has been one of the state’s worst malnutrition affec...

Digital Radar For Efficient Surveillance

The aim of the work is to provide a high efficient surveillance for very costly material like jewelry, gold ornaments and diamonds. In this work an ultra-sonic sensor is collaborated with the digital radar, this senso...

Multichannel Allocation in Data Schemes using Data Mining(DMM) based Methodology for Multi Moving Nodes in Adhoc Computing System

In this paper, we present a new data mining algorithm which involves Data mining for multi moving nodes in a adhoc computing environment and quest the mining results to develop multichannel data allocation schemes so...

MSC Protocol for Target Coverage Issue in Wireless Sensor Networks

Wireless sensor networks are energy constrained networks which is equipped with a battery which has limited lifetime. Replacing the battery regularly is not a feasible option and is quite expensive since a sensor netw...

An Automated Traffic Accident Detection and Alarm Device

The purpose of this work is to find the vehicle where it is and also you can stop that vehicle means after sending a message block you vehicle to your system which is placed inside of vehicle will get hold down there...

Download PDF file
  • EP ID EP8540
  • DOI -
  • Views 398
  • Downloads 26

How To Cite

Vishakha S. Kulkarni, M. S. Gayathri (2014). Preserve the Privacy of Anonymous and Confidential Database using K-anonymity. The International Journal of Technological Exploration and Learning, 3(2), 425-429. https://europub.co.uk/articles/-A-8540