Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015
Anonymizing Data Privacy Personalization and the Web
Sandhyarani Hulage, K. M. Varpe
Personal information should not be exposed to other in any case. Personal data of patients is very sensitive. In other hand sharing of health reports are also necessary for research purpose. So here real challenge is how we can share the information in such way that the researchers can get maximum benefits of data without knowing any patients personal information. Maximizing data usage and minimizing privacy risk are two conflicting goals. Organizations always apply a set of transformations on their data before releasing it. While determining the best set of transformations has been the focus of extensive work in the database community, most of this work suffered from one or both of the following major problems scalability and privacy guarantee. In this project we used Differential Privacy which provides a theoretical formulation for privacy that ensures that the system essentially behaves the same way regardless of whether any individual is included in the database.
Keywords: Differential Privacy, security, risk management, data sharing, data utility, anonymity, scalability
Edition: Volume 4 Issue 7, July 2015
Pages: 2573 - 2576
How to Cite this Article?
Sandhyarani Hulage, K. M. Varpe, "Anonymizing Data Privacy Personalization and the Web", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB157005, Volume 4 Issue 7, July 2015, 2573 - 2576
106 PDF Views | 83 PDF Downloads
Similar Articles with Keyword 'Differential Privacy'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1534 - 1539Data Anonymization Approach for Data Privacy
Padma L. Gaikwad, M. M. Naoghare
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2573 - 2576Anonymizing Data Privacy Personalization and the Web
Sandhyarani Hulage, K. M. Varpe
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2022 - 2024Supermodularity Approach for Differential Data Privacy
Padma L. Gaikwad, M. M. Neoghare
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1483 - 1486A Study of Differentially Private Frequent Itemset Mining
Trupti Kenekar, A. R. Dani
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 545 - 551A Survey Paper on Frequent Itemset Mining Methods and Techniques
Sheetal Labade, Srinivas Narasim Kini
Similar Articles with Keyword 'security'
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 890 - 894A Survey on Types of Crawlers and Web Searching Algorithms
T. Yogameera, Dr. D. Shanthi
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Similar Articles with Keyword 'risk management'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2573 - 2576Anonymizing Data Privacy Personalization and the Web
Sandhyarani Hulage, K. M. Varpe
Dissertation Chapters, Computer Science & Engineering, Ukraine, Volume 4 Issue 9, September 2015
Pages: 588 - 590The Method of Assessing Risk Management at Various Stages of the Life Cycle for the Problem of Diagnostics of Technical Condition of Buildings
Svitlana Tsiutsiura, Olexander Terentyev
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2536 - 2540Survey on Mobile Cloud Computing
Kamalpreet Kaur, Navpreet Kaur Walia
Research Paper, Computer Science & Engineering, United States of America, Volume 9 Issue 3, March 2020
Pages: 723 - 726IT Risk Register and Responses
Anshuman Awasthi
Research Paper, Computer Science & Engineering, India, Volume 7 Issue 10, October 2018
Pages: 86 - 88Fake Product Review Detection and Removal
Aditya Darak, Akhil Chaudhary, Prajwal Mogaveera
Similar Articles with Keyword 'data sharing'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2097 - 2100Prototype of Computing Device That Aims to Secure User Data on a Compromised OS
Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 3169 - 3172A Survey on Secure Data Sharing and Collaboration Approaches in Cloud Computing
Prajakta Solapurkar, Girish Potdar
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1345 - 1350Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks
Kapilesh S. Swami, Dr. P Sai Kiran
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1232 - 1234A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem
Rashmi Khawale, Omprakash Tembhurne
Similar Articles with Keyword 'data utility'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1165 - 1168Privacy Preserving Closed Frequent Pattern Mining
Anju Vijayan
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1534 - 1539Data Anonymization Approach for Data Privacy
Padma L. Gaikwad, M. M. Naoghare
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 658 - 661A Better Approach for Privacy Preserving Data Publishing by Slicing
Mohd Faquroddin, G. Kiran Kumar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 840 - 844Privacy Data Publishing Using Slicing and Tuple Grouping Strategy
E. Ashwini Kumari, N. Chandra Sekhar Reddy, G. V Geetha Madhavi
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2573 - 2576Anonymizing Data Privacy Personalization and the Web
Sandhyarani Hulage, K. M. Varpe
Similar Articles with Keyword 'anonymity'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1253 - 1257Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing
Vandhana V
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1640 - 1647Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines
Uma Maheswari.T, Dr.V. Kavitha
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1454 - 1457A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data
Waghmare Ashwini R, V. M. Jarali
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1115 - 1121Design and Development of Anonymous Zone Based Partitioning and Routing Protocol in MANETS (AZPR)
Ayeesha Siddiqha, Arshad Khan
Similar Articles with Keyword 'scalability'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1217 - 1219Removing Dedepulication Using Pattern Serach Suffix Arrays
Pratiksha Dhande, Supriya Kumari, Sushmita Tupe, Laukik Shah
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1164 - 1169A Survey on Scalable Big Data Analytics Platform
Ravindra Phule, Madhav Ingle
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 1758 - 1764Data Transfer Based on Between the Node Coverge Area Using Diffe-Hellman Key Algorithm in Adhoc Network
T. Sankar, M. Prakash
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1446 - 1449Cluster Based Efficient Location Aware - Source Multicast Routing Approach for Wireless Sensor Networks
Manjunath CR, Nagaraj G S, Apoorva S, Niranjan A
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi