Preserve the Privacy of Anonymous and Confidential Database using K-anonymity

Abstract

In field of IT sector to maintain privacy and confidentiality of data is very important for decision making. So there is requirement of certain data to be published and exchanging of the information is in demand. The data to be exchanged contains sensitive information which moves around various parties and this may violate individual's privacy. So to preserve information in its accurate form while moving among various parties, my aim is to provide mechanism known as k_anonymous technique that doesn’t allow the unauthenticated user to modify the data. In this application two protocols that will solve this problem based on suppression and generalization k-anonymous and confidential databases are used. The protocols rely on well-known cryptographic assumptions, and it provides theoretical analyses to proof their experimental results to illustrate their efficiency.

Authors and Affiliations

Vishakha S. Kulkarni| M.E. Student, Dept. of Computer Science, Alard College of Engineering & Management, Pune, India, M. S. Gayathri| Asst.Professor, Dept.of Computer Science, Alard College of Engineering & Management, Pune, India

Keywords

Related Articles

Effectual and Rapid Aggregate Data Collection Using Wireless Sensor Network

Theis work aimed to collect the data fast from wireless sensor network under the many-to-one communication known as converge cast. Converge cast, collection of data from a set of sensor towards a mobile sink over a tr...

Implementation of Different Low Power Multipliers Using Verilog

Low power consumption and smaller area are some of the most important criteria for the fabrication of DSP systems and high performance systems. Optimizing the speed and area of the multiplier is a major design issue....

Robust Face Recognition under Difficult Lighting Conditions

This paper addresses the problem of illumination effects on Face recognition and works for an approach to reduce their effect on recognition performance. More broadly, a simple and efficient preprocessing chain that e...

Energy Efficient and Path Stability for RoutingProtocol in Ad-Hoc Network

In Mobile ad-hoc networks, the nodes which help in configuring a path works as a router with numerous mobility. If the moving nodes break the path, a new path has to be discovered. As far as possible the nodes which...

Neural Network in a Joint HAPS and Terrestrial Fixed Broadband System

this paper sheds the light on coexistence of high altitude platform and WiMAX systems as well as sharing same frequency in same coverage area. Spectrum etiquettes used for combined HAP and terrestrial fixed broadband...

Download PDF file
  • EP ID EP8540
  • DOI -
  • Views 352
  • Downloads 26

How To Cite

Vishakha S. Kulkarni, M. S. Gayathri (2014). Preserve the Privacy of Anonymous and Confidential Database using K-anonymity. The International Journal of Technological Exploration and Learning, 3(2), 425-429. https://europub.co.uk/articles/-A-8540