UM: A Novel Seclusion Model for Defending Structural Information of Social Network Data
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
Publishing or sharing the social network data for social science research and business analysis lack of privacy. Existing technique k-anonymity is used to prevent identification of micro data. Even though an attacker may gaining sensitive data if a group of nodes largely share the same sensitive labels. We propose an algorithm, universal –match based Indirect Noise Node which makes use of noise nodes to preserve utilities of the original graph. Finally that technique prevents an attacker from reidentifying a user and finding the fact that a certain user has a specific sensitive value.
Authors and Affiliations
N Nalini Krupa, CH. S. V. V. S. N Murty
Exploration Distribution And Appliances Problems In Mobile Sensor Networks
This paper goes for examining different exploration issues of executing the portable entryway to coordinate remote sensor system (WSN) and different systems and another strategy for actualizing cell telephones itself...
HFRECCA : A New Sentence Clustering Technique For Text Mining
Clustering is the process of grouping or aggregating of data items. Sentence clustering mainly used in variety of applications such as classify and categorization of documents, automatic summary generation, organizing...
The Image Analysis In Web Facial Images For Pursuit Face Annotation
Face annotation means giving the name to the picture which is in the photo. Auto face annotation is assuming pressing part in numerous true applications, for example, genuine administration frameworks and sight and s...
Optimized Word Sense Disambiguation in Hindi using Genetic Algorithm
Word Sense Disambiguation (WSD) is a problem of computationally determining which “sense” of a word is activated by the use of the word in particular context. Genetic Algorithm is used to figure out the appropriate m...
Rattle Adversary In IP Address Race Of Puzzler Networks
Large datasets of existent network streams procured from the mutual network are indispensable resource for the exploration group. An application encompasses network modeling and simulation, recognition of privacy ass...