International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 124 | Views: 274

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 11, November 2013 | Popularity: 6.3 / 10


     

Survey on Privacy-Preservation in Data Mining Using Slicing Strategy

Neha Jamdar, Vanita Babane


Abstract: Privacy-preserving data mining is used to safeguard sensitive information from unsanctioned disclosure. Privacy is an important issue in data publishing years because of the increasing ability to store personal data about users. A number of techniques such as bucketization, generalization have been proposed perform privacy-preserving data mining. Recent work has shown that generalization not support for high- dimensional data. Bucketization cannot prevent membership disclosure and does not apply for data that do not have a clear separation between quasi-identifying attributes and sensitive attributes. A new technique is introduced that is known as slicing, which partitions the data both horizontally and vertically. Slicing provides better data utility than generalization and can be used for membership disclosure protection. Slicing can handle high-dimensional data. Also slicing can be used for attribute disclosure protection and develop an efficient algorithm for computing the sliced data that obey the l-diversity requirement. Slicing is more effective than bucketization in workloads involving the sensitive attribute. Another advantage of slicing can be used to prevent membership disclosure.


Keywords: Data publishing, Data anonymization, Generalization, Bucketization, slicing


Edition: Volume 2 Issue 11, November 2013


Pages: 306 - 309



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Neha Jamdar, Vanita Babane, "Survey on Privacy-Preservation in Data Mining Using Slicing Strategy ", International Journal of Science and Research (IJSR), Volume 2 Issue 11, November 2013, pp. 306-309, https://www.ijsr.net/getabstract.php?paperid=02013489, DOI: https://www.doi.org/10.21275/02013489



Similar Articles

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023

Pages: 550 - 564

Weapon Identification using YOLO V5 Algorithm

Divyamsh Reddy A, M Poojitha, G Puspalalitha, M Vishnu Vardhan Reddy, K Ashok Kumar, G Nithya Sree

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023

Pages: 2571 - 2575

Enhancing IoT Cybersecurity with Graph Neural Networks: Advanced Anomaly Detection and Threat Mitigation

Harish Narne

Share this Article

Downloads: 94

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 2058 - 2061

Privacy Preserved Public Auditing for Distributed Data

Anes P. A., Neethu Francis

Share this Article



Top