Anonymizing Data Privacy Personalization and the Web
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015

Anonymizing Data Privacy Personalization and the Web

Sandhyarani Hulage, K. M. Varpe

Personal information should not be exposed to other in any case. Personal data of patients is very sensitive. In other hand sharing of health reports are also necessary for research purpose. So here real challenge is how we can share the information in such way that the researchers can get maximum benefits of data without knowing any patients personal information. Maximizing data usage and minimizing privacy risk are two conflicting goals. Organizations always apply a set of transformations on their data before releasing it. While determining the best set of transformations has been the focus of extensive work in the database community, most of this work suffered from one or both of the following major problems scalability and privacy guarantee. In this project we used Differential Privacy which provides a theoretical formulation for privacy that ensures that the system essentially behaves the same way regardless of whether any individual is included in the database.

Keywords: Differential Privacy, security, risk management, data sharing, data utility, anonymity, scalability

Edition: Volume 4 Issue 7, July 2015

Pages: 2573 - 2576

Share this Article

How to Cite this Article?

Sandhyarani Hulage, K. M. Varpe, "Anonymizing Data Privacy Personalization and the Web", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB157005, Volume 4 Issue 7, July 2015, 2573 - 2576

106 PDF Views | 83 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Differential Privacy'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1534 - 1539

Data Anonymization Approach for Data Privacy

Padma L. Gaikwad, M. M. Naoghare

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2573 - 2576

Anonymizing Data Privacy Personalization and the Web

Sandhyarani Hulage, K. M. Varpe

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2022 - 2024

Supermodularity Approach for Differential Data Privacy

Padma L. Gaikwad, M. M. Neoghare

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1483 - 1486

A Study of Differentially Private Frequent Itemset Mining

Trupti Kenekar, A. R. Dani

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 545 - 551

A Survey Paper on Frequent Itemset Mining Methods and Techniques

Sheetal Labade, Srinivas Narasim Kini

Share this Article

Similar Articles with Keyword 'security'

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 700 - 705

Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects

Kale Jyoti S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 890 - 894

A Survey on Types of Crawlers and Web Searching Algorithms

T. Yogameera, Dr. D. Shanthi

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'risk management'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2573 - 2576

Anonymizing Data Privacy Personalization and the Web

Sandhyarani Hulage, K. M. Varpe

Share this Article

Dissertation Chapters, Computer Science & Engineering, Ukraine, Volume 4 Issue 9, September 2015

Pages: 588 - 590

The Method of Assessing Risk Management at Various Stages of the Life Cycle for the Problem of Diagnostics of Technical Condition of Buildings

Svitlana Tsiutsiura, Olexander Terentyev

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2536 - 2540

Survey on Mobile Cloud Computing

Kamalpreet Kaur, Navpreet Kaur Walia

Share this Article

Research Paper, Computer Science & Engineering, United States of America, Volume 9 Issue 3, March 2020

Pages: 723 - 726

IT Risk Register and Responses

Anshuman Awasthi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 10, October 2018

Pages: 86 - 88

Fake Product Review Detection and Removal

Aditya Darak, Akhil Chaudhary, Prajwal Mogaveera

Share this Article

Similar Articles with Keyword 'data sharing'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2097 - 2100

Prototype of Computing Device That Aims to Secure User Data on a Compromised OS

Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3169 - 3172

A Survey on Secure Data Sharing and Collaboration Approaches in Cloud Computing

Prajakta Solapurkar, Girish Potdar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1345 - 1350

Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks

Kapilesh S. Swami, Dr. P Sai Kiran

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1232 - 1234

A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem

Rashmi Khawale, Omprakash Tembhurne

Share this Article

Similar Articles with Keyword 'data utility'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1534 - 1539

Data Anonymization Approach for Data Privacy

Padma L. Gaikwad, M. M. Naoghare

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 658 - 661

A Better Approach for Privacy Preserving Data Publishing by Slicing

Mohd Faquroddin, G. Kiran Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 840 - 844

Privacy Data Publishing Using Slicing and Tuple Grouping Strategy

E. Ashwini Kumari, N. Chandra Sekhar Reddy, G. V Geetha Madhavi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2573 - 2576

Anonymizing Data Privacy Personalization and the Web

Sandhyarani Hulage, K. M. Varpe

Share this Article

Similar Articles with Keyword 'anonymity'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1115 - 1121

Design and Development of Anonymous Zone Based Partitioning and Routing Protocol in MANETS (AZPR)

Ayeesha Siddiqha, Arshad Khan

Share this Article

Similar Articles with Keyword 'scalability'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1217 - 1219

Removing Dedepulication Using Pattern Serach Suffix Arrays

Pratiksha Dhande, Supriya Kumari, Sushmita Tupe, Laukik Shah

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1164 - 1169

A Survey on Scalable Big Data Analytics Platform

Ravindra Phule, Madhav Ingle

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1758 - 1764

Data Transfer Based on Between the Node Coverge Area Using Diffe-Hellman Key Algorithm in Adhoc Network

T. Sankar, M. Prakash

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1446 - 1449

Cluster Based Efficient Location Aware - Source Multicast Routing Approach for Wireless Sensor Networks

Manjunath CR, Nagaraj G S, Apoorva S, Niranjan A

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article
Top