Data Anonymization Approach for Data Privacy
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 108 | Weekly Hits: ⮙2 | Monthly Hits: ⮙18

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015

Data Anonymization Approach for Data Privacy

Padma L. Gaikwad, M. M. Naoghare

Data Anonymization is one of the techniques for achieving the database privacy. In this method of data anonymization the facility of hiding the identification factor from the other users. Hence the feature of this method is used for the modification purpose only and that will remove the identities of person and appears table in same way. It will help for maintaining the risk factor. This approach can be increased data utility tradeoff in an organization. Scalability and privacy risk are the main factors regarding any database over an organization. Here this are two factor can be help to maximizing the data utility as well as minimizing the risk by using differential privacy preserving method. At the time of released data differential privacy preserving mechanism support for individual data hiding, by adding the noise and disclose for the secondary purpose.

Keywords: Data Anonymization, Differential, Privacy, scalability

Edition: Volume 4 Issue 12, December 2015

Pages: 1534 - 1539

Share this Article

How to Cite this Article?

Padma L. Gaikwad, M. M. Naoghare, "Data Anonymization Approach for Data Privacy", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=12121502, Volume 4 Issue 12, December 2015, 1534 - 1539

Enter Your Registered Email Address





Similar Articles with Keyword 'Data Anonymization'

Downloads: 102 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 2058 - 2061

Privacy Preserved Public Auditing for Distributed Data

Anes P. A., Neethu Francis

Share this Article

Downloads: 107 | Weekly Hits: ⮙4 | Monthly Hits: ⮙11

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2022 - 2024

Supermodularity Approach for Differential Data Privacy

Padma L. Gaikwad, M. M. Neoghare

Share this Article

Downloads: 108 | Weekly Hits: ⮙2 | Monthly Hits: ⮙18

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1534 - 1539

Data Anonymization Approach for Data Privacy

Padma L. Gaikwad, M. M. Naoghare

Share this Article

Downloads: 109 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1916 - 1919

Data Anonymization Using Map Reduce On Cloud by Using Scalable Two - Phase Top-Down Specialization Approach

Rahul.S Ransing, M. S. Patole

Share this Article

Downloads: 109 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2435 - 2438

A Scalable Approach for Scheduled Data Anonymization Using MapReduce on Cloud

Surumi K S, Joyal Ulahannan

Share this Article

Similar Articles with Keyword 'Differential'

Downloads: 101 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2725 - 2726

A Survey of Location Based Services Caching for Efficient Data Access in DTN

Trupti Gedam, Archana D. Shinde

Share this Article

Downloads: 106 | Weekly Hits: ⮙5 | Monthly Hits: ⮙12

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1963 - 1966

An Enhanced Keyword Search Using Flexible Ranking Over Differential Query Services in Cloud

Rasiya V M, Shanavas M A

Share this Article

Downloads: 107 | Weekly Hits: ⮙4 | Monthly Hits: ⮙11

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2022 - 2024

Supermodularity Approach for Differential Data Privacy

Padma L. Gaikwad, M. M. Neoghare

Share this Article

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1708 - 1710

A Differential Diagnosis in Medical Field Using SOA and Classifier Techniques: A Review

Rashmi M. Jadhav, Roshani Ade

Share this Article

Similar Articles with Keyword 'Privacy'

Downloads: 32 | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Downloads: 90 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on Users Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

Downloads: 94 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Downloads: 99 | Weekly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Downloads: 99 | Weekly Hits: ⮙3 | Monthly Hits: ⮙9

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1587 - 1591

Layers of Internet Privacy

Amit Dabas, Ashish Kumar Sharma

Share this Article

Similar Articles with Keyword 'scalability'

Downloads: 100 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, Ghana, Volume 4 Issue 2, February 2015

Pages: 2448 - 2452

Reliable and Rapid Routing Configurations for Network Recovery

William Asiedu K. O. Boateng

Share this Article

Downloads: 101 | Weekly Hits: ⮙1

Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1721 - 1725

Secured Load Rebalancing for Distributed Files System in Cloud

Jayesh D. Kamble, Y. B. Gurav

Share this Article

Downloads: 102 | Weekly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2075 - 2077

Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN

Rekha V. Aher, Sunita Nandagave

Share this Article

Downloads: 102 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Downloads: 103 | Weekly Hits: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2457 - 2462

Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation

Rashmi Kadu, Sonali Patil

Share this Article



Top