A Technique to improve Security of Data in Multilevel Trust
Journal Title: Indian Journal of Computer Science and Engineering - Year 2014, Vol 5, Issue 2
Abstract
The Privacy Preserving Data Mining technique that is used widely to conserve security of data is a random perturbation method. The original data is modified and many copies are created according to the trust levels in each field. The addition of noise level also varies with each trust level. The amount of noise added to the lower order trust level is less, whereas it is high in the higher order trust level. There is a chance for the hackers to reconstruct the original data with some non linear techniques. This challenge is addressed by the proposal of a novel non linear technique. Here, the noise level of each copy is checked after perturbation of the actual data. If any similarity is found in the noise level, reconstruction of the original data is possible. Therefore, additional noise is included in the perturbed data. This process is repeated till zero percent of similarity of data is attained.
Authors and Affiliations
A. Viji Amutha Mary , Dr. T. Jebarajan
RECONCILIATION OF CHANGES ON XML LISTS
In this research, we developed an efficient reconciliation method for mobile environments by using edit scripts of XML data sent from each mobile device. To obtain a simple model for mobile devices, we use the XML list d...
A New Approach to Microcalcification Detection Using Fuzzy Soft Set Approach
This paper presents a new computer aided detection method for identifying malignant images in digital mammograms using fuzzy soft set theory approach. Fuzzy soft set theory is a mathematical model based on parameterizati...
Statistical Approach to Optimize Master-Worker Allocation in Grid Computing
We investigate the problem arising in allocating master and workers in the Master-Worker Paradigm. Although various methods have been proposed for Master-Worker allocation, optimal allocation is yet to be achieved. This...
A TRAILBLAZING MODUS OPERANDI TO FACE IDENTIFICATION USING A RECKONING ARCHETYPAL PRINCIPAL COMPONENT ANALYSIS
Face identification is a task of designating human faces with exact names, akin to identifying between similar twins. The work was motivated and is imbibed by physiology and information theory domains. The approach treat...
BER ANALYSIS OF CODED AND UNCODED MIMO-OFDM SYSTEM IN WIRELESS COMMUNICATION
Alamouti’s space-time coding scheme for Multi-Input Multi-Output (MIMO) system has drawn much attention in 4G wireless technologies. Orthogonal frequency division multiplexing (OFDM) is a popular method for high data rat...