Anonymizing Data Privacy Personalization and the Web
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 137 , Downloads: 109 | CTR: 80 % | Weekly Popularity: ⮙4

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015

Anonymizing Data Privacy Personalization and the Web

Sandhyarani Hulage, K. M. Varpe

Personal information should not be exposed to other in any case. Personal data of patients is very sensitive. In other hand sharing of health reports are also necessary for research purpose. So here real challenge is how we can share the information in such way that the researchers can get maximum benefits of data without knowing any patients personal information. Maximizing data usage and minimizing privacy risk are two conflicting goals. Organizations always apply a set of transformations on their data before releasing it. While determining the best set of transformations has been the focus of extensive work in the database community, most of this work suffered from one or both of the following major problems scalability and privacy guarantee. In this project we used Differential Privacy which provides a theoretical formulation for privacy that ensures that the system essentially behaves the same way regardless of whether any individual is included in the database.

Keywords: Differential Privacy, security, risk management, data sharing, data utility, anonymity, scalability

Edition: Volume 4 Issue 7, July 2015

Pages: 2573 - 2576

Share this Article

How to Cite this Article?

Sandhyarani Hulage, K. M. Varpe, "Anonymizing Data Privacy Personalization and the Web", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB157005, Volume 4 Issue 7, July 2015, 2573 - 2576

137 PDF Views | 109 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Differential Privacy'

Views: 122 , Downloads: 103 | CTR: 84 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2022 - 2024

Supermodularity Approach for Differential Data Privacy

Padma L. Gaikwad, M. M. Neoghare

Share this Article

Views: 140 , Downloads: 105 | CTR: 75 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1534 - 1539

Data Anonymization Approach for Data Privacy

Padma L. Gaikwad, M. M. Naoghare

Share this Article

Views: 137 , Downloads: 109 | CTR: 80 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2573 - 2576

Anonymizing Data Privacy Personalization and the Web

Sandhyarani Hulage, K. M. Varpe

Share this Article

Views: 139 , Downloads: 113 | CTR: 81 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1483 - 1486

A Study of Differentially Private Frequent Itemset Mining

Trupti Kenekar, A. R. Dani

Share this Article

Views: 149 , Downloads: 115 | CTR: 77 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 545 - 551

A Survey Paper on Frequent Itemset Mining Methods and Techniques

Sheetal Labade, Srinivas Narasim Kini

Share this Article

Similar Articles with Keyword 'security'

Views: 30 , Downloads: 25 | CTR: 83 % | Weekly Popularity: ⮙18

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Views: 47 , Downloads: 40 | CTR: 85 %

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Views: 163 , Downloads: 40 | CTR: 25 %

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Views: 63 , Downloads: 45 | CTR: 71 % | Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 700 - 705

Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects

Kale Jyoti S

Share this Article

Similar Articles with Keyword 'risk management'

Views: 137 , Downloads: 109 | CTR: 80 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2573 - 2576

Anonymizing Data Privacy Personalization and the Web

Sandhyarani Hulage, K. M. Varpe

Share this Article

Views: 136 , Downloads: 113 | CTR: 83 % | Weekly Popularity: ⮙1

Dissertation Chapters, Computer Science & Engineering, Ukraine, Volume 4 Issue 9, September 2015

Pages: 588 - 590

The Method of Assessing Risk Management at Various Stages of the Life Cycle for the Problem of Diagnostics of Technical Condition of Buildings

Svitlana Tsiutsiura, Olexander Terentyev

Share this Article

Views: 142 , Downloads: 119 | CTR: 84 % | Weekly Popularity: ⮙6

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2536 - 2540

Survey on Mobile Cloud Computing

Kamalpreet Kaur, Navpreet Kaur Walia

Share this Article

Views: 177 , Downloads: 148 | CTR: 84 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, United States of America, Volume 9 Issue 3, March 2020

Pages: 723 - 726

IT Risk Register and Responses

Anshuman Awasthi

Share this Article

Views: 446 , Downloads: 231 | CTR: 52 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 10, October 2018

Pages: 86 - 88

Fake Product Review Detection and Removal

Aditya Darak, Akhil Chaudhary, Prajwal Mogaveera

Share this Article

Similar Articles with Keyword 'data sharing'

Views: 142 , Downloads: 99 | CTR: 70 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this Article

Views: 136 , Downloads: 100 | CTR: 74 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1232 - 1234

A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem

Rashmi Khawale, Omprakash Tembhurne

Share this Article

Views: 129 , Downloads: 101 | CTR: 78 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Views: 134 , Downloads: 103 | CTR: 77 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2097 - 2100

Prototype of Computing Device That Aims to Secure User Data on a Compromised OS

Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse

Share this Article

Views: 125 , Downloads: 103 | CTR: 82 % | Weekly Popularity: ⮙5

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2467 - 2469

Literature Review on: Secure Sharing of Data for Dynamic Groups in Cloud

Shazadi Fatima Rizvi, A. N. Jaiswal

Share this Article

Similar Articles with Keyword 'data utility'

Views: 135 , Downloads: 98 | CTR: 73 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Views: 140 , Downloads: 105 | CTR: 75 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1534 - 1539

Data Anonymization Approach for Data Privacy

Padma L. Gaikwad, M. M. Naoghare

Share this Article

Views: 134 , Downloads: 108 | CTR: 81 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 658 - 661

A Better Approach for Privacy Preserving Data Publishing by Slicing

Mohd Faquroddin, G. Kiran Kumar

Share this Article

Views: 126 , Downloads: 109 | CTR: 87 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3127 - 3134

A Survey of Random Decision Tree Framework Privacy Preserving Data Mining

Vina M. Lomte, Hemlata B. Deorukhakar

Share this Article

Views: 137 , Downloads: 109 | CTR: 80 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2573 - 2576

Anonymizing Data Privacy Personalization and the Web

Sandhyarani Hulage, K. M. Varpe

Share this Article

Similar Articles with Keyword 'anonymity'

Views: 134 , Downloads: 92 | CTR: 69 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Views: 142 , Downloads: 99 | CTR: 70 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this Article

Views: 127 , Downloads: 101 | CTR: 80 %

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Share this Article

Views: 137 , Downloads: 103 | CTR: 75 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this Article

Views: 138 , Downloads: 105 | CTR: 76 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 984 - 986

Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems

Vrushali G. Chabilwad, A. D. Gujar

Share this Article

Similar Articles with Keyword 'scalability'

Views: 135 , Downloads: 99 | CTR: 73 %

Research Paper, Computer Science & Engineering, Ghana, Volume 4 Issue 2, February 2015

Pages: 2448 - 2452

Reliable and Rapid Routing Configurations for Network Recovery

William Asiedu K. O. Boateng

Share this Article

Views: 132 , Downloads: 100 | CTR: 76 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Views: 134 , Downloads: 101 | CTR: 75 % | Weekly Popularity: ⮙2

Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1721 - 1725

Secured Load Rebalancing for Distributed Files System in Cloud

Jayesh D. Kamble, Y. B. Gurav

Share this Article

Views: 123 , Downloads: 101 | CTR: 82 % | Weekly Popularity: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1617 - 1621

Managing Failures in IP Networks Using SDN Controllers by Adding Module to OpenFlow

Vivek S, Karthikayini T

Share this Article

Views: 116 , Downloads: 102 | CTR: 88 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2839 - 2841

Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing

Sagar S. Sanghavi, Rajesh A. Auti

Share this Article
Top