International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 94 | Views: 290

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014 | Popularity: 6.8 / 10


     

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V


Abstract: Nowadays, no: of research and development in privacy preserving publishing of social networking data. The privacy is one of the important concerns for the social network. So, our aim is protect the privacy preserving publishing of social networking data in collaborative environment using the k-anonymity model, the set of nodes share the same attributes so, the sensitive information may gain access by the intruder. So, our aim is that how to protect the sensitive attributes of individuals and the structural information of social network data in collaborative environment. In this paper we study the existing structure anonymization mechanisms and defined a model called k-degree-l-diversity anonymity model, which takes into consideration the structural information and sensitive labels of individuals in collaborative data publishing. Collaborative data publishing means that different publishers publish their data independently for e. g. in hospitals, wish to publish anonymzed view of their data. We have large no: of dataset its not anonymized so; the attacker should be hack the data. So, they protect the datas of dierent publishers from the hackers by using a new anonymization method called k-degree l diversity model.


Keywords: Anonymization, Collaboration, Social network, Sensitive attributes


Edition: Volume 3 Issue 7, July 2014


Pages: 1253 - 1257



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Vandhana V, "Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing", International Journal of Science and Research (IJSR), Volume 3 Issue 7, July 2014, pp. 1253-1257, https://www.ijsr.net/getabstract.php?paperid=20141251, DOI: https://www.doi.org/10.21275/20141251



Similar Articles

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, United States of America, Volume 12 Issue 11, November 2023

Pages: 998 - 1004

AI-Infused Threat Detection and Incident Response in Cloud Security

Sumanth Tatineni

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 10, October 2024

Pages: 1831 - 1836

Risk Assessment in Online Social Networks Through Client Activity Analysis using Machine Learning

Sanaboina Chandra Sekhar

Share this Article

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 3, March 2022

Pages: 1275 - 1279

A Novel Technique for Authorship Verification of Hijacked Online Social Networks User Accounts

Astha Gupta, Mahesh Parmar

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 12, December 2021

Pages: 820 - 822

Research on Public Opinion Security under Blockchain Architecture

Wang Hong-Mei

Share this Article



Top