Downloads: 104 | Views: 246
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016 | Popularity: 6.8 / 10
A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data
Waghmare Ashwini R, V. M. Jarali
Abstract: Today Information is most likely the vital and demanded resource. Distribution, transfer, mining and publishing data are primary operations in everyday life. Preserving the privacy of persons is indispensable one. Sensitive private information must be protected when data is published. The data should be uncovered through proper access control mechanism. Unauthorized data observation results in the disclosure of information to users not authorized to gain access to such information. There are two kinds of risks namely identity disclosure and attribute disclosure that affects privacy of persons whose data are published. Premature Researchers have contributed new methods specifically k-anonymity, l-diversity to protect privacy. K-anonymity method preserves privacy of persons against identity disclosure attack only. But Attribute disclosure attack makes negotiation this method. Limitation of k-anonymity is satisfied through l-diversity method. But it does not satisfy the privacy against the two attacks those are identity disclosure attack and attribute disclosure attack in several scenarios. To preserve the privacy of individuals sensitive information from attribute and identity disclosure attacks a new method is proposed. This method minimization information loss and gains the privacy by using generalization algorithm which is proposed in this method and is described in this paper.
Keywords: Privacy Preservation, Data mining, Anonymization, k-anonymity, access control
Edition: Volume 5 Issue 8, August 2016
Pages: 1454 - 1457
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1068 - 1070Predicting the Course Knowledge Level of Students using Data Mining Techniques
Thapaswini P S
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 947 - 949COVID-19 Prediction using Machine Learning Algorithms
Saily Suresh Patil
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023
Pages: 1840 - 1846Analysis of Placement for Electronics and Communication Engineering Students using Multiple Clustering
Dr. Dola Sanjay S