Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014
Supermodularity Approach for Differential Data Privacy
Padma L. Gaikwad, M. M. Neoghare
Now a day the maximizing of data usage and minimizing privacy risk are two conflicting goals. The organization required set of transformation at the time of release data. While determining the best set of transformations has been the focus on the extensive work in the database community, the scalability and privacy are major problems while data transformation. Scalability and privacy risk of data anonymization can be addressed by using differential privacy. Differential privacy provides a theoretical formulation for privacy. A scalable algorithm is use to find the differential privacy when applying specific random sampling. The risk function can be employ through the supermodularity properties such as convex optimization.
Keywords: Differential privacy, Scalability, privacy, supermodularity, convex optimization
Edition: Volume 3 Issue 11, November 2014
Pages: 2022 - 2024
How to Cite this Article?
Padma L. Gaikwad, M. M. Neoghare, "Supermodularity Approach for Differential Data Privacy", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141458, Volume 3 Issue 11, November 2014, 2022 - 2024
Similar Articles with Keyword 'Differential privacy'
Data Anonymization Approach for Data Privacy
Padma L. Gaikwad, M. M. Naoghare
Anonymizing Data Privacy Personalization and the Web
Sandhyarani Hulage, K. M. Varpe
Similar Articles with Keyword 'Scalability'
Categorize & Compare Cloud Automation & Devops Tools
Pardeep Singh Virdi
Reliable and Rapid Routing Configurations for Network Recovery
William Asiedu K. O. Boateng
Similar Articles with Keyword 'privacy'
Two Accounts of Solitude in Online Communal Networks
Alla Venu Gopal, G. Srinivasa Reddy
Privacy Preserving Utility Verification of Data Published
Similar Articles with Keyword 'Differential'
A Survey on the Applications of Generative Adversarial Networks
Ashish Roy, Dr. B. G. Prasad
Privacy Preserving Closed Frequent Pattern Mining