A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Today Information is most likely the vital and demanded resource. Distribution, transfer, mining and publishing data are primary operations in everyday life. Preserving the privacy of persons is indispensable one. Sensitive private information must be protected when data is published. The data should be uncovered through proper access control mechanism.Unauthorized data observation results in the disclosure of information to users not authorized to gain access to such information.There are two kinds of risks namely identity disclosure and attribute disclosure that affects privacy of persons whose data are published. Premature Researchers have contributed new methods specifically k-anonymity, l-diversity to protect privacy. K-anonymity method preserves privacy of persons against identity disclosure attack only. But Attribute disclosure attack makes negotiation this method. Limitation of k-anonymity is satisfied through l-diversity method. But it does not satisfy the privacy against the two attacks those are identity disclosure attack and attribute disclosure attack in several scenarios. To preserve the privacy of individuals sensitive information from attribute and identity disclosure attacks a new method is proposed. This method minimization information loss and gains the privacy by using generalization algorithm which is proposed in this method and is described in this paper.

Keywords: Privacy Preservation, Data mining, Anonymization, k-anonymity, access control

Edition: Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

Share this Article

How to Cite this Article?

Waghmare Ashwini R, V. M. Jarali, "A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20161247, Volume 5 Issue 8, August 2016, 1454 - 1457

127 PDF Views | 101 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Privacy Preservation'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1989 - 1992

Privacy-Preservation and Public Auditing for Cloud Data - A Survey

S Archana, Ananthi J

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1358 - 1361

A Survey on Privacy Preservation and sharing Data Securely in Cloud Storage

Manoj. S. Tore, S. K. Sonkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this Article

Similar Articles with Keyword 'Data mining'

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1669 - 1672

Random Forest Based Heart Disease Prediction

Adeen, Preeti Sondhi

Share this Article

Research Paper, Computer Science & Engineering, Kenya, Volume 7 Issue 5, May 2018

Pages: 1409 - 1411

Students Performance Prediction Using FP-Tree Data Mining Techniques

Eliakim Ombati Akama

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 528 - 532

Knowledge Fusion Technique Using Classifier Ensemble by Combining the Sets of Classification Rules

Jaydeep B. Patil, Vaishali Nandedkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2507 - 2509

A Survey on Extended MI technique for Edit Recommendation using Hybrid History Mining and Relevance Feedback

Shradha P. Patil, B. Padmavathi

Share this Article

Similar Articles with Keyword 'Anonymization'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 2058 - 2061

Privacy Preserved Public Auditing for Distributed Data

Anes P. A., Neethu Francis

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1534 - 1539

Data Anonymization Approach for Data Privacy

Padma L. Gaikwad, M. M. Naoghare

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 118 - 125

Advanced Unsupervised Anonymization Technique in Social Networks for Privacy Preservation

Anjali R Kulkarni, Yogish H K

Share this Article

Similar Articles with Keyword 'k-anonymity'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1916 - 1919

Data Anonymization Using Map Reduce On Cloud by Using Scalable Two - Phase Top-Down Specialization Approach

Rahul.S Ransing, M. S. Patole

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2244 - 2248

Privacy in Location-Based Services

Sampada Sarodaya, S. V. Dabhade

Share this Article

Similar Articles with Keyword 'access control'

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1736 - 1740

Enhanced Retreat of Cloud Storage Data users by Using Improved Data Access Control Scheme for Multi-Authority Cloud Storage

Shafi Shaik, M. Geethalatha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2839 - 2841

Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing

Sagar S. Sanghavi, Rajesh A. Auti

Share this Article
Top