A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064


Amazon Sale


Research Paper | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Today Information is most likely the vital and demanded resource. Distribution, transfer, mining and publishing data are primary operations in everyday life. Preserving the privacy of persons is indispensable one. Sensitive private information must be protected when data is published. The data should be uncovered through proper access control mechanism.Unauthorized data observation results in the disclosure of information to users not authorized to gain access to such information.There are two kinds of risks namely identity disclosure and attribute disclosure that affects privacy of persons whose data are published. Premature Researchers have contributed new methods specifically k-anonymity, l-diversity to protect privacy. K-anonymity method preserves privacy of persons against identity disclosure attack only. But Attribute disclosure attack makes negotiation this method. Limitation of k-anonymity is satisfied through l-diversity method. But it does not satisfy the privacy against the two attacks those are identity disclosure attack and attribute disclosure attack in several scenarios. To preserve the privacy of individuals sensitive information from attribute and identity disclosure attacks a new method is proposed. This method minimization information loss and gains the privacy by using generalization algorithm which is proposed in this method and is described in this paper.

Keywords: Privacy Preservation, Data mining, Anonymization, k-anonymity, access control

Edition: Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

Share this Article

How to Cite this Article?

Waghmare Ashwini R, V. M. Jarali, "A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20161247, Volume 5 Issue 8, August 2016, 1454 - 1457

57 PDF Views | 51 PDF Downloads

Download Article PDF


Amazon Sale


Similar Articles with Keyword 'Privacy Preservation'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1592 - 1597

Privacy Conserving Gradient Descent Method Applied for Neural Network with Distributed Datasets

Sachin P. Yadav, Amit B. Chougule

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2435 - 2438

A Scalable Approach for Scheduled Data Anonymization Using MapReduce on Cloud

Surumi K S, Joyal Ulahannan

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1982 - 1985

Review: Firewall Privacy Preservation By Packet Filtering Management

Akshay Dattatray Kachare, Geeta Atkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 658 - 661

A Better Approach for Privacy Preserving Data Publishing by Slicing

Mohd Faquroddin, G. Kiran Kumar

Share this Article

Similar Articles with Keyword 'Data mining'

Research Paper, Computer Science & Engineering, Kenya, Volume 7 Issue 5, May 2018

Pages: 1409 - 1411

Student's Performance Prediction Using FP-Tree Data Mining Techniques

Eliakim Ombati Akama

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1569 - 1573

Survey on Parallel Comparison of Text Document with Input Data Mining and VizSFP

Priyanka P. Palsaniya, D. C. Dhanwani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1822 - 1825

Fraud Detection in Banking Sector using Data Mining

B. Rajdeepa, D. Nandhitha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2041 - 2047

Adaptive Analysis of Knowledge Engineering and Pattern Recognition on Medical Data

Jani Basha, Dasari. Rajesh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Similar Articles with Keyword 'Anonymization'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2435 - 2438

A Scalable Approach for Scheduled Data Anonymization Using MapReduce on Cloud

Surumi K S, Joyal Ulahannan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1534 - 1539

Data Anonymization Approach for Data Privacy

Padma L. Gaikwad, M. M. Naoghare

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 658 - 661

A Better Approach for Privacy Preserving Data Publishing by Slicing

Mohd Faquroddin, G. Kiran Kumar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 2058 - 2061

Privacy Preserved Public Auditing for Distributed Data

Anes P. A., Neethu Francis

Share this Article

Similar Articles with Keyword 'k-anonymity'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2244 - 2248

Privacy in Location-Based Services

Sampada Sarodaya, S. V. Dabhade

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1600 - 1604

FIM-Anonymizing Using Tree Structured Data

Rabitha T, Farzin Ahammed T

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2068 - 2071

Bottom-Up Generalization: A Data Mining Solution to Privacy Protection

Vishakha B. Dalvi, Ranjit R. Keole

Share this Article

Similar Articles with Keyword 'access control'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1216 - 1220

Finger Vein Weightage Calculation of Imaginary Curve between Minutiae Points for Person Recognition

Reetika, Kiran Gupta

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2461 - 2464

A Secure Approach for Privacy-Preserving in Information Brokering System using Query Forwarding

Madhuri D. Dhayarkar, Ram B. Joshi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2060 - 2063

Envision Issue Inclined of an Application Exploiting Model-Based Integration and System Test Automation

Kiran V. Bakka, Aarti Deshpande

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1122 - 1125

Improving Security of Traceable White-Box CPABE with TTP Access Control

Dilu Anil

Share this Article
Top