Survey on Privacy-Preservation in Data Mining Using Slicing Strategy

Journal Title: International Journal of Science and Research (IJSR) - Year 2013, Vol 2, Issue 11

Abstract

Privacy-preserving data mining is used to safeguard sensitive information from unsanctioned disclosure. Privacy is an important issue in data publishing years because of the increasing ability to store personal data about users. A number of techniques such as bucketization, generalization have been proposed perform privacy-preserving data mining. Recent work has shown that generalization not support for high- dimensional data. Bucketization cannot prevent membership disclosure and does not apply for data that do not have a clear separation between quasi-identifying attributes and sensitive attributes. A new technique is introduced that is known as slicing, which partitions the data both horizontally and vertically. Slicing provides better data utility than generalization and can be used for membership disclosure protection. Slicing can handle high-dimensional data. Also slicing can be used for attribute disclosure protection and develop an efficient algorithm for computing the sliced data that obey the l-diversity requirement. Slicing is more effective than bucketization in workloads involving the sensitive attribute. Another advantage of slicing can be used to prevent membership disclosure.

Authors and Affiliations

Keywords

Related Articles

Impacts of Agricultural Activities on Water Quality in the Dufuya Dambos, Lower Gweru, Zimbabwe

Recently, concern over agricultural diffuse pollution sources in integrated water quality management has been growing. High inorganic and organic fertilisers application rates may increase groundwater pollution and these...

Spatial and Temporal Variations in Physical and Chemical Parameters in Water of Rupsha South Western BangladeshRiver and Relationship with Edaphic Factors in Khulna

The physical and chemical condition of Rupsha River of Khulna and Edaphic factors of the study area was chemically analyzed for 12 months (January-December, 2011). Temporal variation in physical and chemical parameters w...

Finite Impulse Response (FIR) Filter Design using Canonical Signed Digits (CSD)

In the presented work, it is proposed to design and analyze a high order FIR filter based on canonical signed digits representation of coefficients in order to minimize the power consumption and fast implementation of th...

VLSI Implementation of an Optical OFDM Transmitter Using 180nm Technology

Orthogonal Frequency Division Multiplexing (OFDM) is a modulation technique which is used in broadband wired and wireless communication systems because it has an effective solution to inter symbol interference and inter...

eDEW: Effective Data Extraction from Web

Internet has become most popular place for accessing World Wide Web (WWW). With the enormous growing amount of information over Internet, accurate and efficient web data extraction has become necessary. Nevertheless, the...

Download PDF file
  • EP ID EP339051
  • DOI -
  • Views 84
  • Downloads 0

How To Cite

(2013). Survey on Privacy-Preservation in Data Mining Using Slicing Strategy. International Journal of Science and Research (IJSR), 2(11), -. https://europub.co.uk/articles/-A-339051