Preserving Privacy Using Data Perturbation in Data Stream
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 5
Abstract
Data stream can be conceived as a continuous and changing sequence of data that continuously arrive at a system to store or process. Examples of data streams include computer network traffic, phone conversations, web searches and sensor data etc. The data owners or publishers may not be willing to exactly reveal the true values of their data due to various reasons, most notably privacy considerations. To preserve data privacy during data mining, the issue of privacy preserving data mining has been widely studied and many techniques have been proposed. However, existing techniques for privacy preserving data mining is designed for traditional static data sets and are not suitable for data streams. So the privacy preservation issue of data streams mining is need for the time. This paper focused on describing a method that extends the process of data perturbation on data sets to achieve privacy preservation. The technique mainly exploits a combination of isometric transformations i.e. translation and rotation transformations used with a secure random function in order to provide secrecy of user-specified attributes without losing accuracy in results.
Authors and Affiliations
1Neha Gupta , IndrJeet Rajput
A 5 level, 3 phase H-bridge PWM method for I.M. Controlling with field oriented techniques
This paper presents a micro controller based field oriented control 5-level inverter for three phase Induction motor. IGBT is used as power element. Pulse width modulation techniques (PWM), introduced three decad...
Segmentation of the White Matter from the Brain fMRI Images
Segmentation of the white matter from the brain fMRI images for the study of brain activities and for the diagnosis for various brain related diseases caused by the changes and damages to regions of the brain conti...
An efficient technique for maximization of network lifetime & minimization of delay for the performance enhancement of WSN
The Main emphasis of this paper is to analyze and assess the performance of various techniques in the effort to determine the maximum lifetime of the nodes & minimization of delay. This paper,mainly concentrate...
A STUDY OF DIFFERENT ATTACKS IN MANET AND DISCUSSION ABOUT SOLUTIONS OF BLACK HOLE ATTACK ON AODV PROTOCOL
MANET are gaining popularity now days due to flexibility and communication without the infrastructure or centralized access point. The dynamic changing nature of network topology makes any node in MANET to leave and join...
DVS Scheduling in Multi Core Real Time System
Embedded systems have been widely used in portable devices. To meet real time application demands computing capability of the embedded system should be high. It is very important for designing of embedded system to...