Privacy Preserving Utility Verification Security of Data Published by Non Interactive Differentially Private Mechanisms
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064


Amazon Sale


Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 1, January 2017

Privacy Preserving Utility Verification Security of Data Published by Non Interactive Differentially Private Mechanisms

Gouri Namdeo Kale, Dr. S. N. Kini

Service providers have the ability to collect large amounts of user data. Sometimes, a set of providers may try to aggregate their data for specific data mining tasks. In this process, how to protect users privacy is extremely critical. Number of user write an own novel, own story and own dataset, every user want to keep this data safe on own site and with user internet facility user always search a digital publisher. This is the so-called privacy-preserving collaborative data publishing problem. In this paper, we consider the collaborative data publishing problem for anonymizing horizontally partitioned data at multiple data providers. We consider a new type of insider attack by colluding data providers who may use their own data records (a subset of the overall data) to infer the data records contributed by other data providers. The paper addresses this new threat, and makes several contributions.

Keywords: privacy, security, frequent itemset mining

Edition: Volume 6 Issue 1, January 2017

Pages: 2008 - 2010

Share this Article

How to Cite this Article?

Gouri Namdeo Kale, Dr. S. N. Kini, "Privacy Preserving Utility Verification Security of Data Published by Non Interactive Differentially Private Mechanisms", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20164451, Volume 6 Issue 1, January 2017, 2008 - 2010

67 PDF Views | 56 PDF Downloads

Download Article PDF


Amazon Sale


Similar Articles with Keyword 'privacy'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article

Similar Articles with Keyword 'security'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Similar Articles with Keyword 'frequent itemset mining'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1227 - 1231

An Efficient Clustering Based High Utility Infrequent Weighted Item Set Mining Approach

Dr. N. Umadevi, A. Gokila Devi

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1419 - 1424

High Utility Itemsets Mining ? A Brief Explanation with a Proposal

Anu Augustin, Dr. Vince Paul

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1979 - 1983

A Survey on Mining User-Aware Rare Sequential Pattern

Salmath Amina KP, Farzin Ahammed T

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1483 - 1486

A Study of Differentially Private Frequent Itemset Mining

Trupti Kenekar, A. R. Dani

Share this Article
Top