UM: A Novel Seclusion Model for Defending Structural Information of Social Network Data
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
Publishing or sharing the social network data for social science research and business analysis lack of privacy. Existing technique k-anonymity is used to prevent identification of micro data. Even though an attacker may gaining sensitive data if a group of nodes largely share the same sensitive labels. We propose an algorithm, universal –match based Indirect Noise Node which makes use of noise nodes to preserve utilities of the original graph. Finally that technique prevents an attacker from reidentifying a user and finding the fact that a certain user has a specific sensitive value.
Authors and Affiliations
N Nalini Krupa, CH. S. V. V. S. N Murty
LACK OF TRAINING DATA IN SENTIMENT CLASSIFICATION: CURRENT SOLUTIONS
In recent years, sentiment classification has attracted much attention from natural language processing researchers. Most of researchers in this field consider sentiment classification as a supervised classification p...
Design of Low Power FPGA using Autonomous Power Gating and LEDR Encoding
The most important key challenge in the IC scaling era is to deliver high performance solutions in the process of minimizing power, area and cost. The main objective of this paper is to reduce power consumption by co...
Programmable Medication Wireless Alert System (Using Bluetooth)
With time and age, people get older and cease to remember various things, that includes their time to take proper medicines, which is very much essential for them. The aim of this paper is to provide a technical solut...
Minimizing Network Overhead In MANET Using Elliptic Curve Cryptography
In this paper, we propose and implement a new intrusion-detection system with ECC Algorithm specially designed for MANETs. The self-configuring ability of nodes in MANET made it popular among critical mission applica...
To Develop an Efficient Approach to NCL Selection In DTNS Based on a Probabilistic Selection Metric
Caching is an additional way to supply data access. Cooperative caching in wireless ad hoc networks was studied in which each node caches pass-by data based on data popularity, so that queries in the potential can be...