Providing Efficient Privacy Of Xml Data By Using Anonymity

Abstract

Scientists mine the extensive information got from various sources having distinctive configurations like database information and XML. Protection is one of most critical component while exchanging the information to information mineworkers. Prior exploration on security concentrated just database table information. For this k-anonymity and l-diversity qualities procedures are accessible to avoid unveil of client information. Present center to giving security on tree structure information .however existing techniques can't give protection on tree organized information. We exhibit a novel security calculation termed as k(m;n)- anonymity Along with covetous anonymization heuristic which avoids personality divulgence of information.

Authors and Affiliations

A. Veera Lakshmi| Dept of IT, ADITYA Engineering College, Surampalem, Gandepalli Mandal, East Godavari District,AP,India, P. Nanna Babu| Dept of IT, ADITYA Engineering College, Surampalem, Gandepalli Mandal, East Godavari District,AP,India

Keywords

Related Articles

A Novel Rescue System At Congested Traffic Cities

In this paper, I have presented to overcome major problems in modern urban areas which have caused much uncomfortable for the ambulance due to the traffic. Moreover road accidents in the city have been nonstop and to...

Biodiesel Production By Using Native Micro Algae From Food Processing Wastewater In Shake Flask Cultures

The present study describes the biodiesel production from food processing wastewater by using Chlorella vulgaris, Botryococcus braunii and mixed algae (Chlorella vulgaris, Botryococcus braunii, Nostoc and Anaebena)....

Huddling For Anonymization Of Compacted And Disseminated Public Systems

Social network: a social structure consists of nodes and ties. Noes are the individual actors within the networks May be different kinds May have attributes, labels or classes Ties are the relationships between the a...

Protection of “Fault Tolerant Parallel Filters” by Hamming code with Reversible logic

Advanced channels are generally utilized as a part of flag preparing and correspondence frameworks. Now and again, the dependability of those frameworks is basic, and blame tolerant channel executions are required. T...

We show another fine-grained two-factor Authentication (2FA) get the opportunity to control system for electronic conveyed processing organizations. Specifically, in our proposed 2FA access control structure, a quali...

Download PDF file
  • EP ID EP16812
  • DOI -
  • Views 519
  • Downloads 8

How To Cite

A. Veera Lakshmi, P. Nanna Babu (2016). Providing Efficient Privacy Of Xml Data By Using Anonymity. International Journal of Science Engineering and Advance Technology, 4(10), 574-576. https://europub.co.uk/articles/-A-16812