Preserving Privacy Using Data Perturbation in Data Stream
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 5
Abstract
Data stream can be conceived as a continuous and changing sequence of data that continuously arrive at a system to store or process. Examples of data streams include computer network traffic, phone conversations, web searches and sensor data etc. The data owners or publishers may not be willing to exactly reveal the true values of their data due to various reasons, most notably privacy considerations. To preserve data privacy during data mining, the issue of privacy preserving data mining has been widely studied and many techniques have been proposed. However, existing techniques for privacy preserving data mining is designed for traditional static data sets and are not suitable for data streams. So the privacy preservation issue of data streams mining is need for the time. This paper focused on describing a method that extends the process of data perturbation on data sets to achieve privacy preservation. The technique mainly exploits a combination of isometric transformations i.e. translation and rotation transformations used with a secure random function in order to provide secrecy of user-specified attributes without losing accuracy in results.
Authors and Affiliations
1Neha Gupta , IndrJeet Rajput
Mitigating Denial of Service Attacks in Wireless Networks
The open nature of the wireless media becomes a root cause for denial of service attack. Denial of Service (DOS) can be different types and disrupt multiple layers. The idea here is to prevent the cyberspace from DOS att...
Sql-Injection Tool for finding the Vulnerability and Automatic Creation of Attacks on JSP
These days’ cyber attacks have become a major concern because these attackers can steal important documents and damage websites and access confidential information and may drive many corporations that conduct the...
Study of Imaged Based Human Height Measurement & Application
— The paper represents practical improvement in Imaged based human height measurement system. The configuration of proposed measurement is very simple, consisting of one static camera and laser circuitry. Camera...
SECURE MULTICAST COMMUNICATION USING GROUP BASED MULTICAST HIERARCHY
Secure multicast communication is a significant requirement in emerging applications in adhoc environments like military or public emergency network applications. Membership dynamism is a major challenge in providi...
An Effective S-Box Comparison by Parity Based Fault Detection Scheme Using Composite Fields
AES is the most effective algorithm for network security that is more confidential, reliable and robust. A key step in the Advanced Encryption Standard (AES) algorithm is the subbyte transformation and its inverse . The...