Supermodularity Approach for Differential Data Privacy
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064


Amazon Sale


Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Supermodularity Approach for Differential Data Privacy

Padma L. Gaikwad, M. M. Neoghare

Now a day the maximizing of data usage and minimizing privacy risk are two conflicting goals. The organization required set of transformation at the time of release data. While determining the best set of transformations has been the focus on the extensive work in the database community, the scalability and privacy are major problems while data transformation. Scalability and privacy risk of data anonymization can be addressed by using differential privacy. Differential privacy provides a theoretical formulation for privacy. A scalable algorithm is use to find the differential privacy when applying specific random sampling. The risk function can be employ through the supermodularity properties such as convex optimization.

Keywords: Differential privacy, Scalability, privacy, supermodularity, convex optimization

Edition: Volume 3 Issue 11, November 2014

Pages: 2022 - 2024

Share this Article

How to Cite this Article?

Padma L. Gaikwad, M. M. Neoghare, "Supermodularity Approach for Differential Data Privacy", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141458, Volume 3 Issue 11, November 2014, 2022 - 2024

68 PDF Views | 50 PDF Downloads

Download Article PDF


Amazon Sale


Similar Articles with Keyword 'Differential privacy'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1534 - 1539

Data Anonymization Approach for Data Privacy

Padma L. Gaikwad, M. M. Naoghare

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2022 - 2024

Supermodularity Approach for Differential Data Privacy

Padma L. Gaikwad, M. M. Neoghare

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2573 - 2576

Anonymizing Data Privacy Personalization and the Web

Sandhyarani Hulage, K. M. Varpe

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1483 - 1486

A Study of Differentially Private Frequent Itemset Mining

Trupti Kenekar, A. R. Dani

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 545 - 551

A Survey Paper on Frequent Itemset Mining Methods and Techniques

Sheetal Labade, Srinivas Narasim Kini

Share this Article

Similar Articles with Keyword 'Scalability'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 408 - 410

Movie Recommendation System using Naive Bayes Algorithm with Collaborative Filtering

Anchal Dubey, Raju Ranjan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2528 - 2530

To Improve Fault Tolerance in Mobile Distributed System

Anupama Padha, Meenakshi Sharma

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1617 - 1621

Managing Failures in IP Networks Using SDN Controllers by Adding Module to OpenFlow

Vivek S, Karthikayini T

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1944 - 1947

Design and Implementation of Tarf for WSNs

Kavita, Amareshwari Patil

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1227 - 1231

An Efficient Clustering Based High Utility Infrequent Weighted Item Set Mining Approach

Dr. N. Umadevi, A. Gokila Devi

Share this Article

Similar Articles with Keyword 'privacy'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article

Similar Articles with Keyword 'convex optimization'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2022 - 2024

Supermodularity Approach for Differential Data Privacy

Padma L. Gaikwad, M. M. Neoghare

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2638 - 2642

A Review Paper on Retrieval Magnets for Facial Duplication by Search Based Face Annotation

Deepika B. Patil, Ayesha Butalia

Share this Article
Top