Downloads: 124 | Views: 274
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 11, November 2013 | Popularity: 6.3 / 10
Survey on Privacy-Preservation in Data Mining Using Slicing Strategy
Neha Jamdar, Vanita Babane
Abstract: Privacy-preserving data mining is used to safeguard sensitive information from unsanctioned disclosure. Privacy is an important issue in data publishing years because of the increasing ability to store personal data about users. A number of techniques such as bucketization, generalization have been proposed perform privacy-preserving data mining. Recent work has shown that generalization not support for high- dimensional data. Bucketization cannot prevent membership disclosure and does not apply for data that do not have a clear separation between quasi-identifying attributes and sensitive attributes. A new technique is introduced that is known as slicing, which partitions the data both horizontally and vertically. Slicing provides better data utility than generalization and can be used for membership disclosure protection. Slicing can handle high-dimensional data. Also slicing can be used for attribute disclosure protection and develop an efficient algorithm for computing the sliced data that obey the l-diversity requirement. Slicing is more effective than bucketization in workloads involving the sensitive attribute. Another advantage of slicing can be used to prevent membership disclosure.
Keywords: Data publishing, Data anonymization, Generalization, Bucketization, slicing
Edition: Volume 2 Issue 11, November 2013
Pages: 306 - 309
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Student Project, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023
Pages: 550 - 564Weapon Identification using YOLO V5 Algorithm
Divyamsh Reddy A, M Poojitha, G Puspalalitha, M Vishnu Vardhan Reddy, K Ashok Kumar, G Nithya Sree
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023
Pages: 2571 - 2575Enhancing IoT Cybersecurity with Graph Neural Networks: Advanced Anomaly Detection and Threat Mitigation
Harish Narne
Downloads: 94
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1253 - 1257Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing
Vandhana V
Downloads: 103
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 2058 - 2061Privacy Preserved Public Auditing for Distributed Data
Anes P. A., Neethu Francis