UM: A Novel Seclusion Model for Defending Structural Information of Social Network Data
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
Publishing or sharing the social network data for social science research and business analysis lack of privacy. Existing technique k-anonymity is used to prevent identification of micro data. Even though an attacker may gaining sensitive data if a group of nodes largely share the same sensitive labels. We propose an algorithm, universal –match based Indirect Noise Node which makes use of noise nodes to preserve utilities of the original graph. Finally that technique prevents an attacker from reidentifying a user and finding the fact that a certain user has a specific sensitive value.
Authors and Affiliations
N Nalini Krupa, CH. S. V. V. S. N Murty
Quality Of Service And Load Balancing For Data Center In Cloud
Cloud frameworks are not quite the same as normal dispersed frameworks. Above all else, they are branded by an extremely big numeral of resources that can distance different administrative domains. Presentation evalua...
Verification of Metadata by Encryption for Data Storage Security in Cloud
Cloud Computing provides the way to share distributed resources and services that belong to different organizations or sites. Since Cloud Computing share distributed resources via network in the open environment thus...
Invalid Detachment centered Outlier Recognition acquired from Reverse Nearest Neighbors
Data Mining essentially alludes to the extraction of exceptionally fascinating examples of the Data from the gigantic Data sets. Anomaly recognition is one of the imperative parts of Data mining which really discover...
Information Retreival Navigation System For Knowledge Discovery From Biomed Articles
The terminology used in Biomedicine shows lexical peculiarities that have required the elaboration of terminological resources and Information Retrieval systems with specific functionalities. Our discovery process en...
Data Possession Using Shipment Equilibrium Model And Mechanism on Multi cloud Environment
Shipment equilibrium mechanism is the main building blocks for cloud computing applications which is based on the Map Reduce programming concept. Shipment equilibrium is essential for efficient operations in distribu...