International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 11, November 2013

Survey on Privacy-Preservation in Data Mining Using Slicing Strategy

Neha Jamdar, Vanita Babane

Privacy-preserving data mining is used to safeguard sensitive information from unsanctioned disclosure. Privacy is an important issue in data publishing years because of the increasing ability to store personal data about users. A number of techniques such as bucketization, generalization have been proposed perform privacy-preserving data mining. Recent work has shown that generalization not support for high- dimensional data. Bucketization cannot prevent membership disclosure and does not apply for data that do not have a clear separation between quasi-identifying attributes and sensitive attributes. A new technique is introduced that is known as slicing, which partitions the data both horizontally and vertically. Slicing provides better data utility than generalization and can be used for membership disclosure protection. Slicing can handle high-dimensional data. Also slicing can be used for attribute disclosure protection and develop an efficient algorithm for computing the sliced data that obey the l-diversity requirement. Slicing is more effective than bucketization in workloads involving the sensitive attribute. Another advantage of slicing can be used to prevent membership disclosure.

Keywords: Data publishing, Data anonymization, Generalization, Bucketization, slicing

Edition: Volume 2 Issue 11, November 2013

Pages: 306 - 309


How to Cite this Article?

Neha Jamdar, Vanita Babane, "Survey on Privacy-Preservation in Data Mining Using Slicing Strategy ", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013489, Volume 2 Issue 11, November 2013, 306 - 309

22 PDF Views | 17 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data publishing'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 658 - 661

A Better Approach for Privacy Preserving Data Publishing by Slicing

Mohd Faquroddin, G. Kiran Kumar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 711 - 715

Secure Data Publishing System with Membership Revelation

A. Mahesh Kumar, B. Naresh Achari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 840 - 844

Privacy Data Publishing Using Slicing and Tuple Grouping Strategy

E. Ashwini Kumari, N. Chandra Sekhar Reddy, G. V Geetha Madhavi

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 735 - 739

Comparative Analysis of Privacy Preserving Techniques in Distributed Database

Sapana Anant Patil, Dr. Abhijit Banubakode

Share this article

Similar Articles with Keyword 'Data anonymization'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 2058 - 2061

Privacy Preserved Public Auditing for Distributed Data

Anes P. A., Neethu Francis

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2435 - 2438

A Scalable Approach for Scheduled Data Anonymization Using MapReduce on Cloud

Surumi K S, Joyal Ulahannan

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 971 - 973

Efficient Approach for Anonymizing Tree Structured Dataset using Improved Greedy Search Algorithm

Ruchira Warekar, Savitri Patil

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 658 - 661

A Better Approach for Privacy Preserving Data Publishing by Slicing

Mohd Faquroddin, G. Kiran Kumar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 308 - 311

Data Anonymization Approaches for Data Sets Using Map Reduce on Cloud: A Survey

Veena, Devidas

Share this article

Similar Articles with Keyword 'Generalization'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2435 - 2438

A Scalable Approach for Scheduled Data Anonymization Using MapReduce on Cloud

Surumi K S, Joyal Ulahannan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 658 - 661

A Better Approach for Privacy Preserving Data Publishing by Slicing

Mohd Faquroddin, G. Kiran Kumar

Share this article

Research Paper, Computer Science & Engineering, Nigeria, Volume 5 Issue 1, January 2016

Pages: 1816 - 1822

Intelligent GSM Based Prepaid Energy Meter in a Cashless Economy

Ebole Alpha F, Kuyoro S.O., Aremu Idris

Share this article

Similar Articles with Keyword 'Bucketization'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 658 - 661

A Better Approach for Privacy Preserving Data Publishing by Slicing

Mohd Faquroddin, G. Kiran Kumar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 980 - 983

The Wrapper Top-Down Specialization and Bottom-up Generalization Approach for Data Anonymization Using MapReduce on Hadoop

Shweta S. Bhand, Sonali Patil

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1539 - 1542

Privacy Based Association Rules in Secure Horizontal Database

Zameena R, Nitha L Rozario

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 711 - 715

Secure Data Publishing System with Membership Revelation

A. Mahesh Kumar, B. Naresh Achari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 840 - 844

Privacy Data Publishing Using Slicing and Tuple Grouping Strategy

E. Ashwini Kumari, N. Chandra Sekhar Reddy, G. V Geetha Madhavi

Share this article

Similar Articles with Keyword 'slicing'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3220 - 3224

Verifiable Secure Secret Image Sharing Scheme

Angel Rose A, Sinu Maria Kurian

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 658 - 661

A Better Approach for Privacy Preserving Data Publishing by Slicing

Mohd Faquroddin, G. Kiran Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3174 - 3177

Optimizing Dynamic Dependence Graph

Toshi Sharma, Madhuri Sharma

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1539 - 1542

Privacy Based Association Rules in Secure Horizontal Database

Zameena R, Nitha L Rozario

Share this article

Top