Rate the Article: Privacy Preserving Utility Verification Security of Data Published by Non Interactive Differentially Private Mechanisms, IJSR, Call for Papers, Online Journal
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 118 | Views: 400 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 1, January 2017 | Rating: 6.5 / 10


Privacy Preserving Utility Verification Security of Data Published by Non Interactive Differentially Private Mechanisms

Gouri Namdeo Kale, Dr. S. N. Kini


Abstract: Service providers have the ability to collect large amounts of user data. Sometimes, a set of providers may try to aggregate their data for specific data mining tasks. In this process, how to protect users privacy is extremely critical. Number of user write an own novel, own story and own dataset, every user want to keep this data safe on own site and with user internet facility user always search a digital publisher. This is the so-called privacy-preserving collaborative data publishing problem. In this paper, we consider the collaborative data publishing problem for anonymizing horizontally partitioned data at multiple data providers. We consider a new type of insider attack by colluding data providers who may use their own data records (a subset of the overall data) to infer the data records contributed by other data providers. The paper addresses this new threat, and makes several contributions.


Keywords: privacy, security, frequent itemset mining


Edition: Volume 6 Issue 1, January 2017,


Pages: 2008 - 2010



Rate this Article


Select Rating (Lowest: 1, Highest: 10)

5

Your Comments (Only high quality comments will be accepted.)

Characters: 0

Your Full Name:


Your Valid Email Address:


Verification Code will appear in 2 Seconds ... Wait

Top