Vertical And Horizontal Partition Of Microdata For Publishing Through Privacy
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 5
Abstract
Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving micro data publishing. Recent work has shown that generalization loses considerable amount of information, especially for high dimensional data. Bucketization, on the other hand, does not prevent membership disclosure and does not apply for data that do not have a clear separation between quasi-identifying attributes and sensitive attributes. We present a novel technique called slicing, which partitions the data both horizontally and vertically.
Authors and Affiliations
N. Venkata Lakshmi, V. Srinivas Rao
Self-assured Data Arrangement within Information Exhaustive Wireless Sensor Correlation
In the corpulent number of outgrowing viable environment each and everything depends on the other sources to transmit the data securely and maintain the data as well in the familiar medium. Transferable nodes in mili...
Detection and Prevention Of Cooperative Black Hole Attack in a MANET
A mobile ad hoc network (MANET) is a selfconfiguring infrastructure-less network of mobile devices connected wirelessly. In MANETs, security plays a major role as the mobile nodes can join and leave the network random...
Implementation of VOIP Communication on Embedded Systems
In the development of VOIP technology, applications of real-time voice communication has corner into widespread use over the Internet. However, their over reliance on PC environment restricts the applying fields of m...
The Importance of Modulators for the Usable Field in Fibre-Optics at Microwave Frequencies
The main discussion of this article will be an in-depth study of one of the main types of light modulating device – The External Modulator which is used in modern fibre optical systems. An overview of the fibre optic...
A Systematic Approach For Testing And Debugging Networks Called Atpg
ATPG recognize router configurations and produces a device-independent model. The imitation is used to make a minimum set of test packets to simply put into effect every link in the network or maximally exercise ever...