International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112 | Views: 257 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014 | Popularity: 6.4 / 10


     

Review of Slicing Approach: Data Publishing with Data Privacy and Data Utility

Vina M. Lomte, Hemlata B. Deorukhakar


Abstract: Data publishing with data privacy and data utility has been emerged to manage high dimensional data efficiently. In this paper; to deal with this advancement in data mining technology using accentuate approach of slicing. Slicing provide better data utility and data privacy than bucketization and generalization. Slicing can handle high dimensional data than generalization which loses great amount of information for high dimensional data. Slicing also prevents from membership disclosure and attributes disclosure.


Keywords: Data Publishing, Data privacy, Generalization, Bucketization, Slicing, Data Utility, Data Anonymization


Edition: Volume 3 Issue 6, June 2014


Pages: 679 - 682



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Vina M. Lomte, Hemlata B. Deorukhakar, "Review of Slicing Approach: Data Publishing with Data Privacy and Data Utility", International Journal of Science and Research (IJSR), Volume 3 Issue 6, June 2014, pp. 679-682, https://www.ijsr.net/getabstract.php?paperid=2014302, DOI: https://www.doi.org/10.21275/2014302



Similar Articles

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023

Pages: 550 - 564

Weapon Identification using YOLO V5 Algorithm

Divyamsh Reddy A, M Poojitha, G Puspalalitha, M Vishnu Vardhan Reddy, K Ashok Kumar, G Nithya Sree

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023

Pages: 2571 - 2575

Enhancing IoT Cybersecurity with Graph Neural Networks: Advanced Anomaly Detection and Threat Mitigation

Harish Narne

Share this Article

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 2058 - 2061

Privacy Preserved Public Auditing for Distributed Data

Anes P. A., Neethu Francis

Share this Article
Top