Anonymization Techniques for Privacy Preservation of published Data
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2015, Vol 3, Issue 4
Abstract
In today’s world data is collected for various purposes. The collected data includes personal details or some other confidential information. Database is a collection of data that can be accessed, updated and it enables user to retrieve data. Providing security to these databases is big issue now days. Today online information is stored for almost everything like-Online admission, online banking, online shopping, E-Health service and social networking etc. This information can be used by insurance companies, drug manufacturing companies and various other marketing agencies without consent of the data provider. To maintain confidentiality, unauthorized third parties must be prevented from accessing and viewing data. It is also essential to maintain database integrity while data is transferring from source to destination. Suppose the data owner wants to share the data with researchers or analysts, how can a data owner technically insure that the individuals who are the subjects of the data cannot be re- identified while the data remain practically useful? Various anonymization techniques, like suppression, generalization and bucketization are designed for preserving privacy of published data. Generalization loses significant amount of information especially for large volume of data and bucketization is not sufficient prevent membership disclosure and cannot be used for data where quasi-identifying attributes and sensitive attributes cannot be clearly separated. . Slicing is new privacy preserving technique which provides improved data utility than generalization and is more efficient in workload pertaining to the sensitive attribute
Authors and Affiliations
Vidya Ingle
Detection and Localization of Multiple Spoofing Attackers Using Asymmetric Key Cryptography Algorithm for Wireless Sensor Network
Due to the openness of the wireless transmission medium, adversaries can monitor any transmission. Further, adversaries can easily purchase low-cost wireless devices and use these commonly available platforms to launch a...
A New Approach of BLDC Motor Using Fuzzy Fractional Order PID
In order to manage the speed of brushless DC (BLDC) motors, this research presents a novel hybrid control method that simultaneously regulates the DC bus voltage of the inverter and the BLDC motor reference current. A fr...
PV Power Generation for an Agricultural Load
India is the 6th largest economy of the world. As per the data 49% of manpower is employed in farming, where as the farming sector contribution to the GDP is merely 16%. This is because of two main causes one is the disg...
Credit Card Fraud Analysis And Detection
Due to the rise and rapid growth of E-Commerce, use of credit cards for online purchases has dramatically increased and it caused an explosion in the credit card fraud. As credit card becomes the most popular mode of pay...
An Overview on the Techniques of Soil Stabilization
The main difficulty is still determining the appropriate soil stabilizers to overcome the challenges posed by soft soils, not only in terms of achieving the required soil engineering features but also in terms of cost an...