Slicing :A Proficient Scheme For Sustain And Publicize
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 1
Abstract
The Privacy Preserving on a microdata publishing different anonymization techniques nameing as generalization and bucketization have been proposes. In generalization amount of information loses on high dimensional data. Bucketization does not prevent membership disclosure and does not provide a clear separation between quasi identifying attributes and sensitive attributes. In this Paper we presents a new technique called slicing. Slicing preserves better data utility than generalization and can be used for membership disclosure protection. Another important advantage of slicing is that it can handle high dimensional data. Slicing can be use for attribute disclosure protection and develop an efficient algorithm for computing the sliced data.
Authors and Affiliations
D. Narayana, S Amar Nath Babu
Efficient and Effective Techniques for Source and Sink Location Privacy in WSN.
While many protocols for sensor network security provide confidentiality for the content of messages contextual information usually remains exposes. Such information can be critical to the mission of the sensor netwo...
Performance Analysis of Different Space Time Block Codes in MIMO Systems
The main limitations of wireless transmission are fading and associated reduction in bit error rate. To mitigate these effects several techniques are employed. It is well known that the performance of the wireless com...
An Approach to reduce Non-linearity of HIPERLAN/2 system using Neural Network
Simulation of ETSI’s High Performance Local Area Network Type 2(HIPERLAN/2) is presented. In this paper we present performance of HIPERLAN/2 model via a MATLAB/Simulink simulation with the original MATLAB/Simulink mo...
Prevention of Routing Attack in Mobile Ad-Hoc Networks: A comparative study
Mobile ad hoc networks (MANET) is a wireless network where nodes work in standalone fashion. The MANET faces various security challenges due to the environment in which it is deployed. The nodes of mobile ad hoc netw...
Dynamic Approach for Secure Data Publishing in Mining
More than a few anonymization techniques, such as simplification and bucketization, have been deliberate for privacy protecting micro data publishing. Current work has shown that generalization loses substantial quant...