Research Paper | Computer Science & Engineering | India | Volume 2 Issue 1, January 2013
Privacy Preserving Suppression Algorithm for Anonymous Databases
Ebin P.M, Brilley Batley. C
Suppose a medical facility connected with a research institution and the researchers can use the medical details of a patient without knowing the personal details. Thus the research data base used by the researchers must be anonymized (Sanitized). We can consider another problem in the area of census. Individuals give the private information to a trusted party (Census Bureau) and the census bureau must publish anonymized or sanitized version of data. So anonymization is done for privacy. Our works deals with privacy in database system.
Keywords: Privacy, Anonymization, Secure Computation, Suppression
Edition: Volume 2 Issue 1, January 2013
Pages: 515 - 518
How to Cite this Article?
Ebin P.M, Brilley Batley. C, "Privacy Preserving Suppression Algorithm for Anonymous Databases", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSROFF2013005, Volume 2 Issue 1, January 2013, 515 - 518
23 PDF Views | 24 PDF Downloads
Similar Articles with Keyword 'Privacy'
Two Accounts of Solitude in Online Communal Networks
Alla Venu Gopal, G. Srinivasa Reddy
Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System
Digvijay A. Patil, Yogesh B. Gurav
Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information
Pranali D. Desai, Vinod S. Wadne
Cloud Computing Security Issues and their Data Privacy Concerns
Amal Matrouk Aljohani
Homomorphic Encryption & A Novel Key Management Technique to Support Data Aggregation in Mobile Sensing
Farhat Afshan, Shameem Akther
Similar Articles with Keyword 'Anonymization'
A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data
Waghmare Ashwini R, V. M. Jarali
Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing
A Survey on Security and Accuracy Constrained Privacy Preserving Task Based Access Control Mechanism for Relational Data
Pratik Bhingardeve, D. H. Kulkarni
Privacy Preserved Public Auditing for Distributed Data
Anes P. A., Neethu Francis
Efficient Approach for Anonymizing Tree Structured Dataset using Improved Greedy Search Algorithm
Ruchira Warekar, Savitri Patil
Similar Articles with Keyword 'Suppression'
Color Transfer Between Images By Minimizing Corruptive Artifacts
Anjali A. Dhanve, Gyankamal J. Chhajed
Example Based Color Transfer with Corruptive Artifacts Suppression
Policy based Collaborative Tagging for Privacy Protection
Benazeer Inamdar, Gyankamal Chhajed
A Colorization Algorithm with Artifacts Suppression on Real Time Video
Sneha P. Mete, Mayur S. Dhait
Detection of Shadow and Its Removal along with the Edge Suppression
Neha Hial, Somesh Dewangan