Protecting Attribute Disclosure for High Dimensionality and Preserving Publishing of Microdata
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 4
Abstract
: Generalization and Bucketization, have been designed for privacy preserving microdata publishing. Recent work has shown that generalization loses considerable amount of information, especially for high-dimensional data. Bucketization, on the other hand, does not prevent membership disclosure and does not apply for data that do not have a clear separation between quasi- identifying attributes and sensitive attributes.In this paper, we present a novel technique called slicing, which partitions the data both horizontally andvertically. We show that slicing preserves better data utility than gen- eralization and can be used for membership disclosure protection. Another important advantage of slicing is that it can handle high-dimensional data. We show how slicing can be used for attribute disclosure protection and develop an ef- ficient algorithm for computing the sliced data that obey the ℓ-diversity requirement.Our workload experiments confirm that slicing preserves better utility than generalization and is more e ective than bucketization in workloads involving the sensitive attribute. Our e xpe ri me nt s also demonstrate that slicing can be used to prevent membership disclosure.
Authors and Affiliations
Shaik. Raf
An Improved Non-Blind Digital Image Watermarking on Hadamard Transform for Image Authentication
Abstract : With the advent of internet digital media has been improving with massive advancement in recent years. The distribution of unauthorized copies of media content has also been increasing day by day. Because of e...
Enhancement Caesar Cipher for Better Security
Abstract: Cryptography is an art and science of converting original message into non readable form. Fast progression of digital data exchange in electronic way, information security is becoming much more important...
[b]Approaches in Key Management Schemes in Mobile Ad-Hoc Networks: A Review [/b]
Abstract: MANET (Mobile Ad hoc Network) is a convenient infrastructure-less contact web that is often susceptible to assorted assaults. Countless critical management schemes for MANETs are given to fix assorted protectio...
Data Quality in Data warehouse: problems and solution
In recent years, corporate scandals, regulatory changes, and the collapse of major financial institutions have brought much warranted attention to the quality of enterprise data if we can better understand the p...
Design of Lane Detecting and Following Autonomous Robot
This paper presents a robot which is designed to autonomously navigate through a track by detecting lanes and centering itself between them by using a camera. We are proposing basic and easy algorithm for track...