Downloads: 114 | Views: 291
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 4, April 2014 | Popularity: 6.6 / 10
Privacy Data Publishing Using Slicing and Tuple Grouping Strategy
E. Ashwini Kumari, N. Chandra Sekhar Reddy, G. V Geetha Madhavi
Abstract: The important factor while publishing the information is better data utility, the information contains individual specific records like employees records, patients records etc. There are many techniques introduced for providing privacy, the existing system has designed with generalization and bucketization techniques along with the sclicing technique. Consider the loss of information is the problem of those methods and they doesnt protect membership disclosure. There is no clear division between sensitive attributes and quasi identifiers. In order to make the system more effective we are using tuple grouping algorithm with slicing. In slicing the data is partitioned both vertically and horizontally. These provide us better data utility than generalization and protect from membership disclosure. it will also handle high dimensional data. For research purpose the data is published and shared by the organization and companies.
Keywords: Data utility, Generalization, Bucketization, slicing, Data publishing
Edition: Volume 3 Issue 4, April 2014
Pages: 840 - 844
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Student Project, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023
Pages: 550 - 564Weapon Identification using YOLO V5 Algorithm
Divyamsh Reddy A, M Poojitha, G Puspalalitha, M Vishnu Vardhan Reddy, K Ashok Kumar, G Nithya Sree
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023
Pages: 2571 - 2575Enhancing IoT Cybersecurity with Graph Neural Networks: Advanced Anomaly Detection and Threat Mitigation
Harish Narne
Downloads: 94
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1253 - 1257Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing
Vandhana V
Downloads: 102
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1165 - 1168Privacy Preserving Closed Frequent Pattern Mining
Anju Vijayan