Cluster Based Attribute Slicing: A New Approach for Privacy Preservation
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014

Cluster Based Attribute Slicing: A New Approach for Privacy Preservation

Vanita Babanne, Neha N. Jamdar

Various anonymization techniques have been proposed for publishing a microdata. Anonymization techniques hide the sensitive data from the attackers. Examples of these techniques are slicing, bucketization and generalization. Generalization hides sensitive data but it loses lot of data. Bucketization make the difficult to detect sensitive attribute by randomizing sensitive attribute but it does not prevent relation between them. Slicing is better technique amongst all remaining technique because it cannot lose information and it is used for maintain the relation between attributes. In case of slicing, equal-width discretization is used to convert continuous attribute into categorical attribute. Equal-width discretization has very time consuming technique. To solve this problem we propose cluster based attribute slicing algorithm. Proposed technique does not take more to sort a data.

Keywords: Privacy Preservation, Data Mining, Slicing Algorithm, Cluster Based Attribute Slicing Algorithm

Edition: Volume 3 Issue 7, July 2014

Pages: 354 - 356

Share this Article

How to Cite this Article?

Vanita Babanne, Neha N. Jamdar, "Cluster Based Attribute Slicing: A New Approach for Privacy Preservation", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20141135, Volume 3 Issue 7, July 2014, 354 - 356

69 PDF Views | 55 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Privacy Preservation'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1592 - 1597

Privacy Conserving Gradient Descent Method Applied for Neural Network with Distributed Datasets

Sachin P. Yadav, Amit B. Chougule

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2435 - 2438

A Scalable Approach for Scheduled Data Anonymization Using MapReduce on Cloud

Surumi K S, Joyal Ulahannan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1982 - 1985

Review: Firewall Privacy Preservation By Packet Filtering Management

Akshay Dattatray Kachare, Geeta Atkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 658 - 661

A Better Approach for Privacy Preserving Data Publishing by Slicing

Mohd Faquroddin, G. Kiran Kumar

Share this Article

Similar Articles with Keyword 'Data Mining'

Research Paper, Computer Science & Engineering, Kenya, Volume 7 Issue 5, May 2018

Pages: 1409 - 1411

Student's Performance Prediction Using FP-Tree Data Mining Techniques

Eliakim Ombati Akama

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2929 - 2932

A Review on Educational Data Mining

Ritu Gautam, Deepika Pahuja

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1822 - 1825

Fraud Detection in Banking Sector using Data Mining

B. Rajdeepa, D. Nandhitha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2041 - 2047

Adaptive Analysis of Knowledge Engineering and Pattern Recognition on Medical Data

Jani Basha, Dasari. Rajesh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article
Top