Supermodularity Approach for Differential Data Privacy
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 107 | Weekly Hits: ⮙4 | Monthly Hits: ⮙11

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Supermodularity Approach for Differential Data Privacy

Padma L. Gaikwad, M. M. Neoghare

Now a day the maximizing of data usage and minimizing privacy risk are two conflicting goals. The organization required set of transformation at the time of release data. While determining the best set of transformations has been the focus on the extensive work in the database community, the scalability and privacy are major problems while data transformation. Scalability and privacy risk of data anonymization can be addressed by using differential privacy. Differential privacy provides a theoretical formulation for privacy. A scalable algorithm is use to find the differential privacy when applying specific random sampling. The risk function can be employ through the supermodularity properties such as convex optimization.

Keywords: Differential privacy, Scalability, privacy, supermodularity, convex optimization

Edition: Volume 3 Issue 11, November 2014

Pages: 2022 - 2024

Share this Article

How to Cite this Article?

Padma L. Gaikwad, M. M. Neoghare, "Supermodularity Approach for Differential Data Privacy", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141458, Volume 3 Issue 11, November 2014, 2022 - 2024

Enter Your Registered Email Address





Similar Articles with Keyword 'Differential privacy'

Downloads: 107 | Weekly Hits: ⮙4 | Monthly Hits: ⮙11

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2022 - 2024

Supermodularity Approach for Differential Data Privacy

Padma L. Gaikwad, M. M. Neoghare

Share this Article

Downloads: 108 | Weekly Hits: ⮙2 | Monthly Hits: ⮙18

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1534 - 1539

Data Anonymization Approach for Data Privacy

Padma L. Gaikwad, M. M. Naoghare

Share this Article

Downloads: 113 | Weekly Hits: ⮙5 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2573 - 2576

Anonymizing Data Privacy Personalization and the Web

Sandhyarani Hulage, K. M. Varpe

Share this Article

Downloads: 115 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1483 - 1486

A Study of Differentially Private Frequent Itemset Mining

Trupti Kenekar, A. R. Dani

Share this Article

Downloads: 117 | Monthly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 545 - 551

A Survey Paper on Frequent Itemset Mining Methods and Techniques

Sheetal Labade, Srinivas Narasim Kini

Share this Article

Similar Articles with Keyword 'Scalability'

Downloads: 100 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, Ghana, Volume 4 Issue 2, February 2015

Pages: 2448 - 2452

Reliable and Rapid Routing Configurations for Network Recovery

William Asiedu K. O. Boateng

Share this Article

Downloads: 101 | Weekly Hits: ⮙1

Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1721 - 1725

Secured Load Rebalancing for Distributed Files System in Cloud

Jayesh D. Kamble, Y. B. Gurav

Share this Article

Downloads: 102 | Weekly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2075 - 2077

Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN

Rekha V. Aher, Sunita Nandagave

Share this Article

Downloads: 102 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Downloads: 103 | Weekly Hits: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2457 - 2462

Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation

Rashmi Kadu, Sonali Patil

Share this Article

Similar Articles with Keyword 'privacy'

Downloads: 32 | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Downloads: 90 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on Users Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

Downloads: 94 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Downloads: 99 | Weekly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Downloads: 99 | Weekly Hits: ⮙3 | Monthly Hits: ⮙9

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1587 - 1591

Layers of Internet Privacy

Amit Dabas, Ashish Kumar Sharma

Share this Article

Similar Articles with Keyword 'convex optimization'

Downloads: 107 | Weekly Hits: ⮙4 | Monthly Hits: ⮙11

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2022 - 2024

Supermodularity Approach for Differential Data Privacy

Padma L. Gaikwad, M. M. Neoghare

Share this Article

Downloads: 113 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2638 - 2642

A Review Paper on Retrieval Magnets for Facial Duplication by Search Based Face Annotation

Deepika B. Patil, Ayesha Butalia

Share this Article



Top