A Novel Approach of Privacy Preserving Data With Anonymizing Tree Structure
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 8
Abstract
Data anonymization techniques have been proposed in order to allow processing of personal data without compromising user’s privacy. the data management community is facing a big challenge to protect personal information of individuals from attackers who try to disclose the information. So data anonymization strategies have been proposed so as to permit handling of individual information without compromising user’s privacy. Data anonymization is a type of information sanitization whose intent is privacy protection. It is the process of either encrypting or removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous. We are presenting k(m;n)-anonymity privacy guarantee which addresses background knowledge of both value and structure using improved and automatic greedy algorithm. (k (m,n) - obscurity ensure) A tree database D is considered k (m,n) - unknown if any assailant who has foundation information of m hub names and n auxiliary relations between them (ancestor descendant), is not ready to utilize this learning to distinguish not as much as k records in D. A tree dataset D can be transformed to a dataset D0 which complies to k (m,n) - anonymity, by a series of transformations.The key idea is to replace rare values with a common generalized value and to remove ancestor descendant relations when they might lead to privacy breaches.
Authors and Affiliations
E. Lohitha| M.Tech (CSE), Lingayas Institute Of Management And Technology, A.P., India, Khaleelullah . Shaik| Assistant Professor, Dept. of Computer Science & Engineering, Lingayas Institute Of Management And Technology, A.P., India
Modeling and Design of Control Reduced-Rating of DVR With a Battery Energy Storage System
In the midst of the past presences a while, In this suspect, assorted voltage implantation anticipates dynamic voltage restorers (DVRs) are investigated with particular spotlight on another technique used to minimize...
Enhanced Document Search and Sharing Tool in Organized P2p Frameworks
In internet p2p file sharing system generating more traffic. in this system file querying is important functionality which indicates the performance of p2p system .To improve file query performance cluster the common...
UPQC Implements The 3-Phase Shunt And Series Active Power Filter To Compensate Current And Voltage Harmonics
This paper presents the three phase shunt and series active power filter in order to reduce the current and voltage harmonics. To implement Unified Power Quality Conditioner (UPQC) control algorithm two control strat...
A Secure Protocol for M-commerce Secure SMS Mobile Payment
The worldwide utilization of the Internet has profoundly supplied the development of e-commerce. Technological advancement in mobile phones (e.g. Mobile phones) has likewise added to doing ecommerce by means of mobile...
Discretion Preservative Itinerant Health Scrutinising By Haze Succour
Haze-assisted mobile health (mHealth) monitoring,which applies the prevailing mobile communications and Haze computing technologies to provide feedback decision support, has been considered as a revolutionary approac...