Research Paper | Computer Science & Engineering | India | Volume 2 Issue 11, November 2013
Survey on Privacy-Preservation in Data Mining Using Slicing Strategy
Neha Jamdar, Vanita Babane
Privacy-preserving data mining is used to safeguard sensitive information from unsanctioned disclosure. Privacy is an important issue in data publishing years because of the increasing ability to store personal data about users. A number of techniques such as bucketization, generalization have been proposed perform privacy-preserving data mining. Recent work has shown that generalization not support for high- dimensional data. Bucketization cannot prevent membership disclosure and does not apply for data that do not have a clear separation between quasi-identifying attributes and sensitive attributes. A new technique is introduced that is known as slicing, which partitions the data both horizontally and vertically. Slicing provides better data utility than generalization and can be used for membership disclosure protection. Slicing can handle high-dimensional data. Also slicing can be used for attribute disclosure protection and develop an efficient algorithm for computing the sliced data that obey the l-diversity requirement. Slicing is more effective than bucketization in workloads involving the sensitive attribute. Another advantage of slicing can be used to prevent membership disclosure.
Keywords: Data publishing, Data anonymization, Generalization, Bucketization, slicing
Edition: Volume 2 Issue 11, November 2013
Pages: 306 - 309
How to Cite this Article?
Neha Jamdar, Vanita Babane, "Survey on Privacy-Preservation in Data Mining Using Slicing Strategy ", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013489, Volume 2 Issue 11, November 2013, 306 - 309
125 PDF Views | 102 PDF Downloads
Similar Articles with Keyword 'Data publishing'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1253 - 1257Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing
Vandhana V
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 658 - 661A Better Approach for Privacy Preserving Data Publishing by Slicing
Mohd Faquroddin, G. Kiran Kumar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 840 - 844Privacy Data Publishing Using Slicing and Tuple Grouping Strategy
E. Ashwini Kumari, N. Chandra Sekhar Reddy, G. V Geetha Madhavi
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 679 - 682Review of Slicing Approach: Data Publishing with Data Privacy and Data Utility
Vina M. Lomte, Hemlata B. Deorukhakar
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013
Pages: 306 - 309Survey on Privacy-Preservation in Data Mining Using Slicing Strategy
Neha Jamdar, Vanita Babane
Similar Articles with Keyword 'Data anonymization'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 2058 - 2061Privacy Preserved Public Auditing for Distributed Data
Anes P. A., Neethu Francis
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1534 - 1539Data Anonymization Approach for Data Privacy
Padma L. Gaikwad, M. M. Naoghare
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 658 - 661A Better Approach for Privacy Preserving Data Publishing by Slicing
Mohd Faquroddin, G. Kiran Kumar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2435 - 2438A Scalable Approach for Scheduled Data Anonymization Using MapReduce on Cloud
Surumi K S, Joyal Ulahannan
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 679 - 682Review of Slicing Approach: Data Publishing with Data Privacy and Data Utility
Vina M. Lomte, Hemlata B. Deorukhakar
Similar Articles with Keyword 'Generalization'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1640 - 1647Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines
Uma Maheswari.T, Dr.V. Kavitha
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1666 - 1668Survey Paper on Cube Computation Techniques
Amar Sawant, Madhav Ingle
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1454 - 1457A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data
Waghmare Ashwini R, V. M. Jarali
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 658 - 661A Better Approach for Privacy Preserving Data Publishing by Slicing
Mohd Faquroddin, G. Kiran Kumar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2435 - 2438A Scalable Approach for Scheduled Data Anonymization Using MapReduce on Cloud
Surumi K S, Joyal Ulahannan
Similar Articles with Keyword 'Bucketization'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 658 - 661A Better Approach for Privacy Preserving Data Publishing by Slicing
Mohd Faquroddin, G. Kiran Kumar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 840 - 844Privacy Data Publishing Using Slicing and Tuple Grouping Strategy
E. Ashwini Kumari, N. Chandra Sekhar Reddy, G. V Geetha Madhavi
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 679 - 682Review of Slicing Approach: Data Publishing with Data Privacy and Data Utility
Vina M. Lomte, Hemlata B. Deorukhakar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 1539 - 1542Privacy Based Association Rules in Secure Horizontal Database
Zameena R, Nitha L Rozario
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013
Pages: 306 - 309Survey on Privacy-Preservation in Data Mining Using Slicing Strategy
Neha Jamdar, Vanita Babane
Similar Articles with Keyword 'slicing'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 3220 - 3224Verifiable Secure Secret Image Sharing Scheme
Angel Rose A, Sinu Maria Kurian
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 3174 - 3177Optimizing Dynamic Dependence Graph
Toshi Sharma, Madhuri Sharma
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1833 - 1836A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 658 - 661A Better Approach for Privacy Preserving Data Publishing by Slicing
Mohd Faquroddin, G. Kiran Kumar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 840 - 844Privacy Data Publishing Using Slicing and Tuple Grouping Strategy
E. Ashwini Kumari, N. Chandra Sekhar Reddy, G. V Geetha Madhavi