Preserve the Privacy of Anonymous and Confidential Database using K-anonymity
Journal Title: The International Journal of Technological Exploration and Learning - Year 2014, Vol 3, Issue 2
Abstract
In field of IT sector to maintain privacy and confidentiality of data is very important for decision making. So there is requirement of certain data to be published and exchanging of the information is in demand. The data to be exchanged contains sensitive information which moves around various parties and this may violate individual's privacy. So to preserve information in its accurate form while moving among various parties, my aim is to provide mechanism known as k_anonymous technique that doesn’t allow the unauthenticated user to modify the data. In this application two protocols that will solve this problem based on suppression and generalization k-anonymous and confidential databases are used. The protocols rely on well-known cryptographic assumptions, and it provides theoretical analyses to proof their experimental results to illustrate their efficiency.
Authors and Affiliations
Vishakha S. Kulkarni| M.E. Student, Dept. of Computer Science, Alard College of Engineering & Management, Pune, India, M. S. Gayathri| Asst.Professor, Dept.of Computer Science, Alard College of Engineering & Management, Pune, India
Effectual and Rapid Aggregate Data Collection Using Wireless Sensor Network
Theis work aimed to collect the data fast from wireless sensor network under the many-to-one communication known as converge cast. Converge cast, collection of data from a set of sensor towards a mobile sink over a tr...
Implementation of Different Low Power Multipliers Using Verilog
Low power consumption and smaller area are some of the most important criteria for the fabrication of DSP systems and high performance systems. Optimizing the speed and area of the multiplier is a major design issue....
Robust Face Recognition under Difficult Lighting Conditions
This paper addresses the problem of illumination effects on Face recognition and works for an approach to reduce their effect on recognition performance. More broadly, a simple and efficient preprocessing chain that e...
Energy Efficient and Path Stability for RoutingProtocol in Ad-Hoc Network
In Mobile ad-hoc networks, the nodes which help in configuring a path works as a router with numerous mobility. If the moving nodes break the path, a new path has to be discovered. As far as possible the nodes which...
Neural Network in a Joint HAPS and Terrestrial Fixed Broadband System
this paper sheds the light on coexistence of high altitude platform and WiMAX systems as well as sharing same frequency in same coverage area. Spectrum etiquettes used for combined HAP and terrestrial fixed broadband...