SlideShare a Scribd company logo
1 of 3
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 4, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 982
A Rule based Slicing Approach to Achieve Data Publishing and Privacy
P. Bhuvaneswari1
C. Saravanabhavan2
1
PG Scholar [M.E.] 2
Assistant Professor
1, 2
Department of Computer Science
1, 2
AMS Engineering College, Namakkal
Abstract—several anonymization techniques, such as
generalization and bucketization, have been designed for
privacy preserving micro data publishing. Recent work has
shown that generalization loses considerable amount of
information, especially for high dimensional data.
Bucketization, on the other hand, does not prevent
membership disclosure and does not apply for data that do
not have a clear separation between quasi-identifying
attributes and sensitive attributes. The existing system
proposed slicing concept to overcome the tuple based
partition this has been done to overcome the previous
generalization and bucketization. In this paper, present a
novel technique called rule based slicing, which partitions
the data both horizontally and vertically. We show that
slicing preserves better data utility than generalization and
can be used for membership disclosure protection. Another
important advantage of slicing is that it can handle high-
dimensional data. We show how slicing can be used for
attribute disclosure protection and develop an efficient
algorithm for computing the sliced data that obey the l-
diversity requirement. The workload experiments confirm
that slicing preserves better utility than generalization and is
more effective than bucketization in workloads involving
the sensitive attribute. The experiments also demonstrate
that slicing can be used to prevent membership disclosure
Index Terms— Privacy preservation, data anonymization,
data publishing, data security
I. INTRODUCTION
Individual entity such as a person a household or an
organization several microdata anonymization techniques
have been proposed. The most popular ones are
generalization for k-anonymity and bucketization for L-
diversity.
In both approaches, attributes are partitioned into three
categories:
1) Some attributes a r e i d e n t i f i e s t h a t c a n
u n i q u e l y i d e n t i f y a n i n d i v i d u a l ’ s such
as Name or Social Security Number;
2) Some attributes are Quasi identifiers (Q1),, which the
adversary may (possibly from other publicly
available databases)and which, when taken together,
can potentially identify an individual, e.g., Birthdate.
Sex, and Zip code; - -
3) Some attributes are sensitive attributes (SAs), which are
unknown to the adversary and considered sensitive, such as
Disease and Salary.
In both generalization and bucketization, one first removesthe
identifiers from the data and then partitions tuples into buckets.
The two techniques differ in the next step. Generalization
transforms the Q1-values in each bucket into less specific but
semantically consistent values so that tuples in the same
bucket cannot be distinguished by their QI values. In
bucketization, one separates the SAs from the Qls by
randomly permuting the SA values in each bucket. The
anonymized data consist of a set of buckets with
permuted sensitive attribute values. PRIVACY-
PRESERVING Publishing of micro-data has records each
of which contains information about
II. MOTIVATION OF SLICING
In this paper, we introduce a novel data anonymization
technique called slicing to improve the current state of
the art. Slicing partitions the data set both vertically
and horizontally. Vertical partitioning is done by
grouping attributes into columns based on the correlations
among the attributes. Each column contains a subset of
attributes that are highly correlated. Horizontal
partitioning is done by grouping tuples into buckets.
Finally, within each bucket, values in each column are
randomly permutated (or sorted) to break the linking
between different columns. The basic idea of slicing is to
break the association cross columns, but to preserve the
association within each column. This reduces the
dimensionality of the data and preserves better utility
than generalization and bucketization. Slicing
preserves utility because it groups highly correlated
attributes together, and preserves the correlations
between such attributes. Slicing protects privacy
because it breaks the associations between
uncorrelated attributes, which are infrequent and thus
identifying. Note that when the data set contains QIs and
one SA, bucketization has to break their correlation;
slicing, on the other hand, can group some QI attributes
with the SA, preserving attribute correlations with the
sensitive attribute.
The key intuition that slicing provides privacy
protection is that the slicing process ensures that for any
tuple, there are generally multiple matching buckets.
Given a tuple t = (vi, v2 cr), where c is the number of
columns and vi is the value for the ith column, a
bucket is a matching bucket for t if and only if for each i
(1 < i < c), vi appears at least once in the i'th column of the
bucket. Any bucket that contains the original tuple is a
matching bucket. At the same time, a matching
bucket can be due to containing other tuples each of
which contains some but not all vi's.
III. RELATED WORK
Two popular anonymization techniques are
generalization and bucketization. Generalization [28], [30],
replaces a value with a "less-specific but semantically
A Rule based Slicing Approach to Achieve Data Publishing and Privacy
(IJSRD/Vol. 1/Issue 4/2013/0040)
All rights reserved by www.ijsrd.com 983
consistent" value. Three types of encoding
schemes have been proposed for generalization:
global recoding, regional recoding, and local recoding.
Global recoding has the property that multiple
occurrences of the same value are always replaced by
the same generalized value. Regional record is also
called multidimensional recoding (the Mondrian
algorithm) which partitions the domain space into
noninterest regions and data points in the same region are
represented by the region they are in. Local recoding
does not have the above constraints and allows
different occurrences of the same value to be generalized
differently. The main problems with generalization are: 1) it
fails on high-dimensional data due to the curse
of dimensionality and 2) it causes too much
information loss due to the uniform-distribution
assumption..
Slicing has some connections to marginal
publication both of them release correlations among a
subset of attributes. Slicing is quite different from
marginal publication in a number of aspects. First,
marginal publication can be viewed as a special case of
slicing which does not have horizontal partitioning.
Therefore, correlations among attributes in different
columns are lost in marginal publication. By horizontal
partitioning, Attribute correlations between
different columns are preserved. Marginal
publication is similar to overlapping vertical partitioning,
which is left as our future work. Second, the key idea of
slicing is to preserve correlations between highly
correlated attributes and to break correlations between
uncorrelated attributes thus achieving both better
utility and better privacy. Third, existing data analysis
(e.g., query answering) methods can be easily used on the
sliced data.
Recently, several approaches have been proposed
to anonymize transactional databases. Terrovitis et al. [31]
proposed the km
-anonymity model which requires that,
for any set of m or less items, the published database
contains at least k transactions containing this set of
items. This model aims at protecting the database against
an adversary who has knowledge of at most m items
in a specific transaction. There are several problems with
the anonymity model: 1) it cannot prevent an adversary
from learning additional items because all k records
may have some other items in common; 2) the adversary
may know the absence of an item and can
potentially identify a particular transaction; and 3)
it is difficult to set an appropriate in value. He and
Naughton [13] used k- anonymity as the privacy
model and developed a local recoding method for
anonymizing transactional databases. The k-anonymity
model also suffers from the first two problems above.
Xu et al. proposed an approach that combines k-anonymity
and C-diversity but their approach considers a clear
separation of the quasi identifiers and the sensitive attribute.
On the contrary, slicing can be applied without such a
separation.
Existing privacy measures for membership
disclosure protection include differential privacy and &
presence. Differential privacy has recently received much
attention in data privacy. Most results on differential privacy
are about answering statistical queries, rather than
publishing microdata. A survey on these results can be
found in. On the other hand, &presence assumes that
the published database is a sample of a large public
database and the adversary has knowledge of this large
database. The calculation of disclosure risk depends on
the choice of this large database. Finally, on attribute
disclosure protection, a number of privacy models have been
proposed, including e-diversity (α,k)-anonymity , and I-
closeness . A few others consider the adversary's
background knowledge.
IV. METHODOLOGIES
Our algorithm consists of three phases: Attribute
partitioning, column generalization and tuple partitioning.
Attribute Partitioning:.
Pearson correlation coefficient and Mean-square
contingency coefficient, we choose to use the mean-square
contingency coefficient because most of our attributes are
categorical. Two attribute A1, A2 with domain {v11,
v12
v1d1} and {v21,v22
v2d2}respectively. Coefficient
between A1 and A2 is defined as
Ø2
(A!,A2)={1/[min(d1,d2)-1]} ∑d1
∑d2
{(fij-fi.f.j)2
/fi.f.j}.In this
phase we first compute the correlations between pairs of
attributes and then cluster attributes based on their
correlations.
A. Attribute clustering
The distance between two attribute in the clustering space is
defined as d(A1,A2)=1- Ø2
(A1,A2)which is in between of
0 and 1. We choose k=medoid method for the following
reason. First, k-medoid method is very robust. Next one is
data points are affect the cluster computed from the k-
medoid method.
B. Special Attribute Partitioning
We adapt the above algorithm to partition attributes into c
columns such that the sensitive column C, contains
a attributes. We first calculate correlations between
the sensitive attribute S and each QI attribute. Then, we
rank the QI attributes by the decreasing order of their
correlations with $ and select the top a - 1 QI attributes.
Now, the sensitive column C, Consists of S and the
selected QI attributes. All other QI attributes
form the other c - 1 column using the attribute
clustering algorithm.
C. Column Generalization
Column generalization is not a required phase; it can be
useful in several aspects. First, column generalization
may be required for identity/membership disclosure
protection. If a column value is unique in a column
(i.e., the column value appears only once in the column), a
tuple with this unique column value can only have
one matching bucket. This is not good for privacy
protection
Second, when column generalization is applied, to
achieve the same level of privacy against attribute
disclosure, bucket sizes can be smaller .While column
generalization may result in information loss, smaller bucket
size allow better data utility.
A Rule based Slicing Approach to Achieve Data Publishing and Privacy
(IJSRD/Vol. 1/Issue 4/2013/0040)
All rights reserved by www.ijsrd.com 984
D. Tuple Partitioning
In the tuple partitioning phase, tuples are partitioned
into buckets
Algorithm tuple-partition (T,L)
Q= {T};SB= Ø
while Q is not empty
remove the first bucket B from Q;Q-{B}.
Split B into two buckets B1 and B2 as in Mondrain.
if(diversity-check(T,QU{B1,B2}USB,L)
Q=Q U {B1, B2}.
Else SB=SB U {B}.
Return (SB).
The algorithm maintain two data structures
1) a queue of buckets Q and
2) a set of sliced buckets SB.
Initially Q contains only one bucket which includes all
tuples and SB is empty, In each iteration the algorithm
removes buckets. If the sliced table after the split satisfies l-
diversity then the algorithm puts the two buckets at the end
of the queue Q. Otherwise we cannot split the bucket
anymore and the algorithm puts the bucket into SB. When Q
becomes empty, we have computed the sliced table. The set
of sliced buckets is SB. In this second phase, tuples are
generalized to satisfy some minimal frequency requirement.
We want to point out that column generalization is not an
indispensable phase in our algorithm.
V. PROPOSED WORK
Introduce a novel data anonymization technique called
slicing to improve the current state of the art. Slicing
partitions the data set both vertically and horizontally.
Vertical partitioning is done by grouping attributes into
columns based on the correlations among the attributes.
Each column contains a subset of attributes that are highly
correlated. Horizontal partitioning is done by grouping
tuples into buckets. Finally, within each bucket, values in
each column are randomly permutated to break the linking
between different columns.
First formalize the idea of global background
knowledge and propose the base model t-closeness which
requires that the distribution of a sensitive in any
equivalence class to be close to the distribution of the
attribute in the overall table. Slicing protects privacy
because it breaks the associations between uncorrelated
attributes, which are infrequent and thus identifying. Slicing
can be effectively used for preventing attribute disclosure.
Membership Disclosure protection
We propose two quantitative measures for the
degree of membership protection offered by slicing. The
first is the fake original ratio (FOR), which is defined as the
number of fake tuples divided by the number of original
tuples. The second measure is to consider the number of
matching buckets for original tuples and that for fake tuples.
Attribute Disclosure protection
In our experiments we choose one attribute as the
target attribute and all other attributes serve as the predictor
attributes. We consider the performance of the
anonymization algorithms in both learning the sensitive
attribute occupation and learning a QI attribute education.
VI. CONCLUSION
The application works and creating databases for every
hospital. The application works well and very helpful to get
patients health record from anywhere. It is concluded that
the application works well and satisfy the users. The
application is tested very well and errors are properly
debugged. The site is simultaneously accessed from more
than one system. Simultaneous login from more than one
place is tested. The site works according to the restrictions
provided in their respective browsers. Further enhancements
can be made to the application, so that the web site
functions very attractive and useful manner than the present
one. The speed of the transactions become more enough
now.
VII. REFERENCES
[1] C. Aggarwal, "On k-Anonymity and the Curse of
Dimensionality," Proc. flirt Conf. Very Large
Databases (VLDB), pp. 901-909, 2005.
[2] A. Blum, C. Dwork, F. McSherry, and K. Nissim,
"Practical Privacy: The SULQ Framework," Proc.
ACM Symp. Principles of Database Systems (PODS),
pp. 128-138, 2005:
[3] J. Brickell and V. Shmatikov, "The Cost of Privacy:
Destruction of Data-Mining Utility in Anonymized Data
Publishing," Proc. ACM SIGKDD Coq Knowledge
Discovery and Data Mining (KDD), pp. 70-78,
2008.
[4] B.-C. Chen, K. LeFevre, and R. Ramakrishnan,
"Privacy Skyline: Privacy with Multidimensional
Adversarial Knowledge," Proc. Int'l Conf. Very Large
Data Bases (VLDB), pp. 770-781, 2007.
[5] H. Cramt'er, Mathematical Methods of Statistics.
Princeton Univ. Press, 1948.
[6] I. Dinur and K. Nissim, "Revealing Information
while Preserving Privacy," Proc. ACM Symp.
Principles of Database Systems (PODS), pp. 202-
210, 2003.
[7] C. Dwork, "Differential Privacy," Proc. Jut'!
Colloquium Automata, Languages and Programming
(ICALP), pp. 1-12, 2006.
[8] C. Dwork, "Differential Privacy: A Survey of Results,"
Proc. Fifth Int'l Conf. Theory and Applications of
Models of Computation (TAMC), PP.
1-19, 2008.
[10] C. Dwork, F. McSherry, K. Nissim, and A. Smith,
"Calibrating Noise to Sensitivity in Private Data
Analysis," Proc. Theory of Cryptography Conf.
(TCC), pp. 265-284, 2006.
[11] J.H. Friedman, J.L. Bentley, and R.A. Finkel, "An
Algorithm for Finding Best Matches in Logarithmic
Expected Time," ACM Trans. Math. Software, vol. 3,
no. 3, pp. 209-226, 1977.
[12] B.C.M. Fung, K. Wang, and P.S. Yu, "Top-Down
Specialization for Information and Privacy
Preservation," Proc. Intl Conf. Data Eng. (ICDE), pp.
205-216, 2005.
[13] G. Ghinita, Y. Tao, and P. Kalnis, "On the
Anonyrnization of Sparse High-Dimensional Data,"
Proc. IEEE 24th Int'l Conf. Data Eng. (ICDE), pp.
715-724,2008.

More Related Content

What's hot

IRJET - Random Data Perturbation Techniques in Privacy Preserving Data Mi...
IRJET -  	  Random Data Perturbation Techniques in Privacy Preserving Data Mi...IRJET -  	  Random Data Perturbation Techniques in Privacy Preserving Data Mi...
IRJET - Random Data Perturbation Techniques in Privacy Preserving Data Mi...IRJET Journal
 
Privacy Preserving Clustering on Distorted data
Privacy Preserving Clustering on Distorted dataPrivacy Preserving Clustering on Distorted data
Privacy Preserving Clustering on Distorted dataIOSR Journals
 
An efficient algorithm for privacy
An efficient algorithm for privacyAn efficient algorithm for privacy
An efficient algorithm for privacyIJDKP
 
Bs31267274
Bs31267274Bs31267274
Bs31267274IJMER
 
51 privacy-preserving-publication-of-set-valued-data
51 privacy-preserving-publication-of-set-valued-data51 privacy-preserving-publication-of-set-valued-data
51 privacy-preserving-publication-of-set-valued-datakarunyaieeeproj
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Review of Various Clustering Techniques
A Review of Various Clustering TechniquesA Review of Various Clustering Techniques
A Review of Various Clustering TechniquesIJEACS
 
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data MiningPerformance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Miningidescitation
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data miningeSAT Publishing House
 
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASECONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASEIJwest
 
Protection models
Protection modelsProtection models
Protection modelsG Prachi
 
Data slicing technique to privacy preserving and data
Data slicing technique to privacy preserving and dataData slicing technique to privacy preserving and data
Data slicing technique to privacy preserving and dataeSAT Publishing House
 
Data slicing technique to privacy preserving and data publishing
Data slicing technique to privacy preserving and data publishingData slicing technique to privacy preserving and data publishing
Data slicing technique to privacy preserving and data publishingeSAT Journals
 
PATTERN GENERATION FOR COMPLEX DATA USING HYBRID MINING
PATTERN GENERATION FOR COMPLEX DATA USING HYBRID MININGPATTERN GENERATION FOR COMPLEX DATA USING HYBRID MINING
PATTERN GENERATION FOR COMPLEX DATA USING HYBRID MININGIJDKP
 
Using Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data MiningUsing Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data Mining14894
 
Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...
Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...
Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...IJCSIS Research Publications
 
Distributed Digital Artifacts on the Semantic Web
Distributed Digital Artifacts on the Semantic WebDistributed Digital Artifacts on the Semantic Web
Distributed Digital Artifacts on the Semantic WebEditor IJCATR
 
A Comparative Study on Privacy Preserving Datamining Techniques
A Comparative Study on Privacy Preserving Datamining  TechniquesA Comparative Study on Privacy Preserving Datamining  Techniques
A Comparative Study on Privacy Preserving Datamining TechniquesIJMER
 

What's hot (19)

winbis1005
winbis1005winbis1005
winbis1005
 
IRJET - Random Data Perturbation Techniques in Privacy Preserving Data Mi...
IRJET -  	  Random Data Perturbation Techniques in Privacy Preserving Data Mi...IRJET -  	  Random Data Perturbation Techniques in Privacy Preserving Data Mi...
IRJET - Random Data Perturbation Techniques in Privacy Preserving Data Mi...
 
Privacy Preserving Clustering on Distorted data
Privacy Preserving Clustering on Distorted dataPrivacy Preserving Clustering on Distorted data
Privacy Preserving Clustering on Distorted data
 
An efficient algorithm for privacy
An efficient algorithm for privacyAn efficient algorithm for privacy
An efficient algorithm for privacy
 
Bs31267274
Bs31267274Bs31267274
Bs31267274
 
51 privacy-preserving-publication-of-set-valued-data
51 privacy-preserving-publication-of-set-valued-data51 privacy-preserving-publication-of-set-valued-data
51 privacy-preserving-publication-of-set-valued-data
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Review of Various Clustering Techniques
A Review of Various Clustering TechniquesA Review of Various Clustering Techniques
A Review of Various Clustering Techniques
 
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data MiningPerformance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data mining
 
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASECONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
 
Protection models
Protection modelsProtection models
Protection models
 
Data slicing technique to privacy preserving and data
Data slicing technique to privacy preserving and dataData slicing technique to privacy preserving and data
Data slicing technique to privacy preserving and data
 
Data slicing technique to privacy preserving and data publishing
Data slicing technique to privacy preserving and data publishingData slicing technique to privacy preserving and data publishing
Data slicing technique to privacy preserving and data publishing
 
PATTERN GENERATION FOR COMPLEX DATA USING HYBRID MINING
PATTERN GENERATION FOR COMPLEX DATA USING HYBRID MININGPATTERN GENERATION FOR COMPLEX DATA USING HYBRID MINING
PATTERN GENERATION FOR COMPLEX DATA USING HYBRID MINING
 
Using Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data MiningUsing Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data Mining
 
Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...
Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...
Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...
 
Distributed Digital Artifacts on the Semantic Web
Distributed Digital Artifacts on the Semantic WebDistributed Digital Artifacts on the Semantic Web
Distributed Digital Artifacts on the Semantic Web
 
A Comparative Study on Privacy Preserving Datamining Techniques
A Comparative Study on Privacy Preserving Datamining  TechniquesA Comparative Study on Privacy Preserving Datamining  Techniques
A Comparative Study on Privacy Preserving Datamining Techniques
 

Viewers also liked

Development of A web and GSM Based Monitoring and Controlling System for PLC ...
Development of A web and GSM Based Monitoring and Controlling System for PLC ...Development of A web and GSM Based Monitoring and Controlling System for PLC ...
Development of A web and GSM Based Monitoring and Controlling System for PLC ...ijsrd.com
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
 
Secure Routing using Detection Method in Wireless Ad Hoc network
 Secure Routing using Detection Method in Wireless Ad Hoc network Secure Routing using Detection Method in Wireless Ad Hoc network
Secure Routing using Detection Method in Wireless Ad Hoc networkijsrd.com
 
Electricity Generation using Thermoelectric System from Waste Heat of Flue Gases
Electricity Generation using Thermoelectric System from Waste Heat of Flue GasesElectricity Generation using Thermoelectric System from Waste Heat of Flue Gases
Electricity Generation using Thermoelectric System from Waste Heat of Flue Gasesijsrd.com
 
Study on causes of cracking of Plaster of Paris boards & an effective solutio...
Study on causes of cracking of Plaster of Paris boards & an effective solutio...Study on causes of cracking of Plaster of Paris boards & an effective solutio...
Study on causes of cracking of Plaster of Paris boards & an effective solutio...ijsrd.com
 
FE Analysis of Hollow Propeller Shaft using Steel and Composite Material then...
FE Analysis of Hollow Propeller Shaft using Steel and Composite Material then...FE Analysis of Hollow Propeller Shaft using Steel and Composite Material then...
FE Analysis of Hollow Propeller Shaft using Steel and Composite Material then...ijsrd.com
 
Sphere Tank Safety Interlock Using PLC
Sphere Tank Safety Interlock Using PLCSphere Tank Safety Interlock Using PLC
Sphere Tank Safety Interlock Using PLCijsrd.com
 
Review on Design and Theoretical Model of Thermoelectric
Review on Design and Theoretical Model of ThermoelectricReview on Design and Theoretical Model of Thermoelectric
Review on Design and Theoretical Model of Thermoelectricijsrd.com
 
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...ijsrd.com
 
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...ijsrd.com
 
Enchancing the Data Collection in Tree based Wireless Sensor Networks
Enchancing the Data Collection in Tree based Wireless Sensor NetworksEnchancing the Data Collection in Tree based Wireless Sensor Networks
Enchancing the Data Collection in Tree based Wireless Sensor Networksijsrd.com
 
Blind Channel Shortening for MIMO-OFDM System Using Zero Padding and Eigen De...
Blind Channel Shortening for MIMO-OFDM System Using Zero Padding and Eigen De...Blind Channel Shortening for MIMO-OFDM System Using Zero Padding and Eigen De...
Blind Channel Shortening for MIMO-OFDM System Using Zero Padding and Eigen De...ijsrd.com
 
Extractable and Leachable Testing In Prefilled Syringes Components
Extractable and Leachable Testing In Prefilled Syringes ComponentsExtractable and Leachable Testing In Prefilled Syringes Components
Extractable and Leachable Testing In Prefilled Syringes Componentsijsrd.com
 
Analysis of different FIR Filter Design Method in terms of Resource Utilizati...
Analysis of different FIR Filter Design Method in terms of Resource Utilizati...Analysis of different FIR Filter Design Method in terms of Resource Utilizati...
Analysis of different FIR Filter Design Method in terms of Resource Utilizati...ijsrd.com
 
Performance of Multiple symbol representation with clipping scheme for PAPR r...
Performance of Multiple symbol representation with clipping scheme for PAPR r...Performance of Multiple symbol representation with clipping scheme for PAPR r...
Performance of Multiple symbol representation with clipping scheme for PAPR r...ijsrd.com
 
Detecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBSDetecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBSijsrd.com
 
Design of Fuzzy Logic Controller for Speed Regulation of BLDC motor using MATLAB
Design of Fuzzy Logic Controller for Speed Regulation of BLDC motor using MATLABDesign of Fuzzy Logic Controller for Speed Regulation of BLDC motor using MATLAB
Design of Fuzzy Logic Controller for Speed Regulation of BLDC motor using MATLABijsrd.com
 
Computational analysis of heat transfer through four-stroke S. I. engine fins
Computational analysis of heat transfer through four-stroke S. I. engine finsComputational analysis of heat transfer through four-stroke S. I. engine fins
Computational analysis of heat transfer through four-stroke S. I. engine finsijsrd.com
 

Viewers also liked (18)

Development of A web and GSM Based Monitoring and Controlling System for PLC ...
Development of A web and GSM Based Monitoring and Controlling System for PLC ...Development of A web and GSM Based Monitoring and Controlling System for PLC ...
Development of A web and GSM Based Monitoring and Controlling System for PLC ...
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
Secure Routing using Detection Method in Wireless Ad Hoc network
 Secure Routing using Detection Method in Wireless Ad Hoc network Secure Routing using Detection Method in Wireless Ad Hoc network
Secure Routing using Detection Method in Wireless Ad Hoc network
 
Electricity Generation using Thermoelectric System from Waste Heat of Flue Gases
Electricity Generation using Thermoelectric System from Waste Heat of Flue GasesElectricity Generation using Thermoelectric System from Waste Heat of Flue Gases
Electricity Generation using Thermoelectric System from Waste Heat of Flue Gases
 
Study on causes of cracking of Plaster of Paris boards & an effective solutio...
Study on causes of cracking of Plaster of Paris boards & an effective solutio...Study on causes of cracking of Plaster of Paris boards & an effective solutio...
Study on causes of cracking of Plaster of Paris boards & an effective solutio...
 
FE Analysis of Hollow Propeller Shaft using Steel and Composite Material then...
FE Analysis of Hollow Propeller Shaft using Steel and Composite Material then...FE Analysis of Hollow Propeller Shaft using Steel and Composite Material then...
FE Analysis of Hollow Propeller Shaft using Steel and Composite Material then...
 
Sphere Tank Safety Interlock Using PLC
Sphere Tank Safety Interlock Using PLCSphere Tank Safety Interlock Using PLC
Sphere Tank Safety Interlock Using PLC
 
Review on Design and Theoretical Model of Thermoelectric
Review on Design and Theoretical Model of ThermoelectricReview on Design and Theoretical Model of Thermoelectric
Review on Design and Theoretical Model of Thermoelectric
 
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
 
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
 
Enchancing the Data Collection in Tree based Wireless Sensor Networks
Enchancing the Data Collection in Tree based Wireless Sensor NetworksEnchancing the Data Collection in Tree based Wireless Sensor Networks
Enchancing the Data Collection in Tree based Wireless Sensor Networks
 
Blind Channel Shortening for MIMO-OFDM System Using Zero Padding and Eigen De...
Blind Channel Shortening for MIMO-OFDM System Using Zero Padding and Eigen De...Blind Channel Shortening for MIMO-OFDM System Using Zero Padding and Eigen De...
Blind Channel Shortening for MIMO-OFDM System Using Zero Padding and Eigen De...
 
Extractable and Leachable Testing In Prefilled Syringes Components
Extractable and Leachable Testing In Prefilled Syringes ComponentsExtractable and Leachable Testing In Prefilled Syringes Components
Extractable and Leachable Testing In Prefilled Syringes Components
 
Analysis of different FIR Filter Design Method in terms of Resource Utilizati...
Analysis of different FIR Filter Design Method in terms of Resource Utilizati...Analysis of different FIR Filter Design Method in terms of Resource Utilizati...
Analysis of different FIR Filter Design Method in terms of Resource Utilizati...
 
Performance of Multiple symbol representation with clipping scheme for PAPR r...
Performance of Multiple symbol representation with clipping scheme for PAPR r...Performance of Multiple symbol representation with clipping scheme for PAPR r...
Performance of Multiple symbol representation with clipping scheme for PAPR r...
 
Detecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBSDetecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBS
 
Design of Fuzzy Logic Controller for Speed Regulation of BLDC motor using MATLAB
Design of Fuzzy Logic Controller for Speed Regulation of BLDC motor using MATLABDesign of Fuzzy Logic Controller for Speed Regulation of BLDC motor using MATLAB
Design of Fuzzy Logic Controller for Speed Regulation of BLDC motor using MATLAB
 
Computational analysis of heat transfer through four-stroke S. I. engine fins
Computational analysis of heat transfer through four-stroke S. I. engine finsComputational analysis of heat transfer through four-stroke S. I. engine fins
Computational analysis of heat transfer through four-stroke S. I. engine fins
 

Similar to A Rule based Slicing Approach to Achieve Data Publishing and Privacy

Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...
Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...
Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...IIRindia
 
Query Processing with k-Anonymity
Query Processing with k-AnonymityQuery Processing with k-Anonymity
Query Processing with k-AnonymityWaqas Tariq
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data miningeSAT Journals
 
journal for research
journal for researchjournal for research
journal for researchrikaseorika
 
ANONYMIZATION OF PRIVACY PRESERVATION
ANONYMIZATION OF PRIVACY PRESERVATIONANONYMIZATION OF PRIVACY PRESERVATION
ANONYMIZATION OF PRIVACY PRESERVATIONpharmaindexing
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...IEEEGLOBALSOFTTECHNOLOGIES
 
Utility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachUtility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachIEEEFINALYEARPROJECTS
 
Proximity aware local-recoding anonymization with map reduce for scalable big...
Proximity aware local-recoding anonymization with map reduce for scalable big...Proximity aware local-recoding anonymization with map reduce for scalable big...
Proximity aware local-recoding anonymization with map reduce for scalable big...Nexgen Technology
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET Journal
 
Improved Slicing Algorithm For Greater Utility In Privacy Preserving Data Pub...
Improved Slicing Algorithm For Greater Utility In Privacy Preserving Data Pub...Improved Slicing Algorithm For Greater Utility In Privacy Preserving Data Pub...
Improved Slicing Algorithm For Greater Utility In Privacy Preserving Data Pub...Waqas Tariq
 
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...Editor IJMTER
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 

Similar to A Rule based Slicing Approach to Achieve Data Publishing and Privacy (20)

Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...
Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...
Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...
 
Query Processing with k-Anonymity
Query Processing with k-AnonymityQuery Processing with k-Anonymity
Query Processing with k-Anonymity
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data mining
 
130509
130509130509
130509
 
130509
130509130509
130509
 
journal for research
journal for researchjournal for research
journal for research
 
ANONYMIZATION OF PRIVACY PRESERVATION
ANONYMIZATION OF PRIVACY PRESERVATIONANONYMIZATION OF PRIVACY PRESERVATION
ANONYMIZATION OF PRIVACY PRESERVATION
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...
 
Utility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachUtility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approach
 
Proximity aware local-recoding anonymization with map reduce for scalable big...
Proximity aware local-recoding anonymization with map reduce for scalable big...Proximity aware local-recoding anonymization with map reduce for scalable big...
Proximity aware local-recoding anonymization with map reduce for scalable big...
 
S34119122
S34119122S34119122
S34119122
 
V01 i010414
V01 i010414V01 i010414
V01 i010414
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
 
Improved Slicing Algorithm For Greater Utility In Privacy Preserving Data Pub...
Improved Slicing Algorithm For Greater Utility In Privacy Preserving Data Pub...Improved Slicing Algorithm For Greater Utility In Privacy Preserving Data Pub...
Improved Slicing Algorithm For Greater Utility In Privacy Preserving Data Pub...
 
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
 
Sop slicing
Sop slicingSop slicing
Sop slicing
 
[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi
[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi
[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi
 
Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
I43055257
I43055257I43055257
I43055257
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 

Recently uploaded (20)

young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 

A Rule based Slicing Approach to Achieve Data Publishing and Privacy

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 4, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 982 A Rule based Slicing Approach to Achieve Data Publishing and Privacy P. Bhuvaneswari1 C. Saravanabhavan2 1 PG Scholar [M.E.] 2 Assistant Professor 1, 2 Department of Computer Science 1, 2 AMS Engineering College, Namakkal Abstract—several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving micro data publishing. Recent work has shown that generalization loses considerable amount of information, especially for high dimensional data. Bucketization, on the other hand, does not prevent membership disclosure and does not apply for data that do not have a clear separation between quasi-identifying attributes and sensitive attributes. The existing system proposed slicing concept to overcome the tuple based partition this has been done to overcome the previous generalization and bucketization. In this paper, present a novel technique called rule based slicing, which partitions the data both horizontally and vertically. We show that slicing preserves better data utility than generalization and can be used for membership disclosure protection. Another important advantage of slicing is that it can handle high- dimensional data. We show how slicing can be used for attribute disclosure protection and develop an efficient algorithm for computing the sliced data that obey the l- diversity requirement. The workload experiments confirm that slicing preserves better utility than generalization and is more effective than bucketization in workloads involving the sensitive attribute. The experiments also demonstrate that slicing can be used to prevent membership disclosure Index Terms— Privacy preservation, data anonymization, data publishing, data security I. INTRODUCTION Individual entity such as a person a household or an organization several microdata anonymization techniques have been proposed. The most popular ones are generalization for k-anonymity and bucketization for L- diversity. In both approaches, attributes are partitioned into three categories: 1) Some attributes a r e i d e n t i f i e s t h a t c a n u n i q u e l y i d e n t i f y a n i n d i v i d u a l ’ s such as Name or Social Security Number; 2) Some attributes are Quasi identifiers (Q1),, which the adversary may (possibly from other publicly available databases)and which, when taken together, can potentially identify an individual, e.g., Birthdate. Sex, and Zip code; - - 3) Some attributes are sensitive attributes (SAs), which are unknown to the adversary and considered sensitive, such as Disease and Salary. In both generalization and bucketization, one first removesthe identifiers from the data and then partitions tuples into buckets. The two techniques differ in the next step. Generalization transforms the Q1-values in each bucket into less specific but semantically consistent values so that tuples in the same bucket cannot be distinguished by their QI values. In bucketization, one separates the SAs from the Qls by randomly permuting the SA values in each bucket. The anonymized data consist of a set of buckets with permuted sensitive attribute values. PRIVACY- PRESERVING Publishing of micro-data has records each of which contains information about II. MOTIVATION OF SLICING In this paper, we introduce a novel data anonymization technique called slicing to improve the current state of the art. Slicing partitions the data set both vertically and horizontally. Vertical partitioning is done by grouping attributes into columns based on the correlations among the attributes. Each column contains a subset of attributes that are highly correlated. Horizontal partitioning is done by grouping tuples into buckets. Finally, within each bucket, values in each column are randomly permutated (or sorted) to break the linking between different columns. The basic idea of slicing is to break the association cross columns, but to preserve the association within each column. This reduces the dimensionality of the data and preserves better utility than generalization and bucketization. Slicing preserves utility because it groups highly correlated attributes together, and preserves the correlations between such attributes. Slicing protects privacy because it breaks the associations between uncorrelated attributes, which are infrequent and thus identifying. Note that when the data set contains QIs and one SA, bucketization has to break their correlation; slicing, on the other hand, can group some QI attributes with the SA, preserving attribute correlations with the sensitive attribute. The key intuition that slicing provides privacy protection is that the slicing process ensures that for any tuple, there are generally multiple matching buckets. Given a tuple t = (vi, v2 cr), where c is the number of columns and vi is the value for the ith column, a bucket is a matching bucket for t if and only if for each i (1 < i < c), vi appears at least once in the i'th column of the bucket. Any bucket that contains the original tuple is a matching bucket. At the same time, a matching bucket can be due to containing other tuples each of which contains some but not all vi's. III. RELATED WORK Two popular anonymization techniques are generalization and bucketization. Generalization [28], [30], replaces a value with a "less-specific but semantically
  • 2. A Rule based Slicing Approach to Achieve Data Publishing and Privacy (IJSRD/Vol. 1/Issue 4/2013/0040) All rights reserved by www.ijsrd.com 983 consistent" value. Three types of encoding schemes have been proposed for generalization: global recoding, regional recoding, and local recoding. Global recoding has the property that multiple occurrences of the same value are always replaced by the same generalized value. Regional record is also called multidimensional recoding (the Mondrian algorithm) which partitions the domain space into noninterest regions and data points in the same region are represented by the region they are in. Local recoding does not have the above constraints and allows different occurrences of the same value to be generalized differently. The main problems with generalization are: 1) it fails on high-dimensional data due to the curse of dimensionality and 2) it causes too much information loss due to the uniform-distribution assumption.. Slicing has some connections to marginal publication both of them release correlations among a subset of attributes. Slicing is quite different from marginal publication in a number of aspects. First, marginal publication can be viewed as a special case of slicing which does not have horizontal partitioning. Therefore, correlations among attributes in different columns are lost in marginal publication. By horizontal partitioning, Attribute correlations between different columns are preserved. Marginal publication is similar to overlapping vertical partitioning, which is left as our future work. Second, the key idea of slicing is to preserve correlations between highly correlated attributes and to break correlations between uncorrelated attributes thus achieving both better utility and better privacy. Third, existing data analysis (e.g., query answering) methods can be easily used on the sliced data. Recently, several approaches have been proposed to anonymize transactional databases. Terrovitis et al. [31] proposed the km -anonymity model which requires that, for any set of m or less items, the published database contains at least k transactions containing this set of items. This model aims at protecting the database against an adversary who has knowledge of at most m items in a specific transaction. There are several problems with the anonymity model: 1) it cannot prevent an adversary from learning additional items because all k records may have some other items in common; 2) the adversary may know the absence of an item and can potentially identify a particular transaction; and 3) it is difficult to set an appropriate in value. He and Naughton [13] used k- anonymity as the privacy model and developed a local recoding method for anonymizing transactional databases. The k-anonymity model also suffers from the first two problems above. Xu et al. proposed an approach that combines k-anonymity and C-diversity but their approach considers a clear separation of the quasi identifiers and the sensitive attribute. On the contrary, slicing can be applied without such a separation. Existing privacy measures for membership disclosure protection include differential privacy and & presence. Differential privacy has recently received much attention in data privacy. Most results on differential privacy are about answering statistical queries, rather than publishing microdata. A survey on these results can be found in. On the other hand, &presence assumes that the published database is a sample of a large public database and the adversary has knowledge of this large database. The calculation of disclosure risk depends on the choice of this large database. Finally, on attribute disclosure protection, a number of privacy models have been proposed, including e-diversity (α,k)-anonymity , and I- closeness . A few others consider the adversary's background knowledge. IV. METHODOLOGIES Our algorithm consists of three phases: Attribute partitioning, column generalization and tuple partitioning. Attribute Partitioning:. Pearson correlation coefficient and Mean-square contingency coefficient, we choose to use the mean-square contingency coefficient because most of our attributes are categorical. Two attribute A1, A2 with domain {v11, v12
v1d1} and {v21,v22
v2d2}respectively. Coefficient between A1 and A2 is defined as Ø2 (A!,A2)={1/[min(d1,d2)-1]} ∑d1 ∑d2 {(fij-fi.f.j)2 /fi.f.j}.In this phase we first compute the correlations between pairs of attributes and then cluster attributes based on their correlations. A. Attribute clustering The distance between two attribute in the clustering space is defined as d(A1,A2)=1- Ø2 (A1,A2)which is in between of 0 and 1. We choose k=medoid method for the following reason. First, k-medoid method is very robust. Next one is data points are affect the cluster computed from the k- medoid method. B. Special Attribute Partitioning We adapt the above algorithm to partition attributes into c columns such that the sensitive column C, contains a attributes. We first calculate correlations between the sensitive attribute S and each QI attribute. Then, we rank the QI attributes by the decreasing order of their correlations with $ and select the top a - 1 QI attributes. Now, the sensitive column C, Consists of S and the selected QI attributes. All other QI attributes form the other c - 1 column using the attribute clustering algorithm. C. Column Generalization Column generalization is not a required phase; it can be useful in several aspects. First, column generalization may be required for identity/membership disclosure protection. If a column value is unique in a column (i.e., the column value appears only once in the column), a tuple with this unique column value can only have one matching bucket. This is not good for privacy protection Second, when column generalization is applied, to achieve the same level of privacy against attribute disclosure, bucket sizes can be smaller .While column generalization may result in information loss, smaller bucket size allow better data utility.
  • 3. A Rule based Slicing Approach to Achieve Data Publishing and Privacy (IJSRD/Vol. 1/Issue 4/2013/0040) All rights reserved by www.ijsrd.com 984 D. Tuple Partitioning In the tuple partitioning phase, tuples are partitioned into buckets Algorithm tuple-partition (T,L) Q= {T};SB= Ø while Q is not empty remove the first bucket B from Q;Q-{B}. Split B into two buckets B1 and B2 as in Mondrain. if(diversity-check(T,QU{B1,B2}USB,L) Q=Q U {B1, B2}. Else SB=SB U {B}. Return (SB). The algorithm maintain two data structures 1) a queue of buckets Q and 2) a set of sliced buckets SB. Initially Q contains only one bucket which includes all tuples and SB is empty, In each iteration the algorithm removes buckets. If the sliced table after the split satisfies l- diversity then the algorithm puts the two buckets at the end of the queue Q. Otherwise we cannot split the bucket anymore and the algorithm puts the bucket into SB. When Q becomes empty, we have computed the sliced table. The set of sliced buckets is SB. In this second phase, tuples are generalized to satisfy some minimal frequency requirement. We want to point out that column generalization is not an indispensable phase in our algorithm. V. PROPOSED WORK Introduce a novel data anonymization technique called slicing to improve the current state of the art. Slicing partitions the data set both vertically and horizontally. Vertical partitioning is done by grouping attributes into columns based on the correlations among the attributes. Each column contains a subset of attributes that are highly correlated. Horizontal partitioning is done by grouping tuples into buckets. Finally, within each bucket, values in each column are randomly permutated to break the linking between different columns. First formalize the idea of global background knowledge and propose the base model t-closeness which requires that the distribution of a sensitive in any equivalence class to be close to the distribution of the attribute in the overall table. Slicing protects privacy because it breaks the associations between uncorrelated attributes, which are infrequent and thus identifying. Slicing can be effectively used for preventing attribute disclosure. Membership Disclosure protection We propose two quantitative measures for the degree of membership protection offered by slicing. The first is the fake original ratio (FOR), which is defined as the number of fake tuples divided by the number of original tuples. The second measure is to consider the number of matching buckets for original tuples and that for fake tuples. Attribute Disclosure protection In our experiments we choose one attribute as the target attribute and all other attributes serve as the predictor attributes. We consider the performance of the anonymization algorithms in both learning the sensitive attribute occupation and learning a QI attribute education. VI. CONCLUSION The application works and creating databases for every hospital. The application works well and very helpful to get patients health record from anywhere. It is concluded that the application works well and satisfy the users. The application is tested very well and errors are properly debugged. The site is simultaneously accessed from more than one system. Simultaneous login from more than one place is tested. The site works according to the restrictions provided in their respective browsers. Further enhancements can be made to the application, so that the web site functions very attractive and useful manner than the present one. The speed of the transactions become more enough now. VII. REFERENCES [1] C. Aggarwal, "On k-Anonymity and the Curse of Dimensionality," Proc. flirt Conf. Very Large Databases (VLDB), pp. 901-909, 2005. [2] A. Blum, C. Dwork, F. McSherry, and K. Nissim, "Practical Privacy: The SULQ Framework," Proc. ACM Symp. Principles of Database Systems (PODS), pp. 128-138, 2005: [3] J. Brickell and V. Shmatikov, "The Cost of Privacy: Destruction of Data-Mining Utility in Anonymized Data Publishing," Proc. ACM SIGKDD Coq Knowledge Discovery and Data Mining (KDD), pp. 70-78, 2008. [4] B.-C. Chen, K. LeFevre, and R. Ramakrishnan, "Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge," Proc. Int'l Conf. Very Large Data Bases (VLDB), pp. 770-781, 2007. [5] H. Cramt'er, Mathematical Methods of Statistics. Princeton Univ. Press, 1948. [6] I. Dinur and K. Nissim, "Revealing Information while Preserving Privacy," Proc. ACM Symp. Principles of Database Systems (PODS), pp. 202- 210, 2003. [7] C. Dwork, "Differential Privacy," Proc. Jut'! Colloquium Automata, Languages and Programming (ICALP), pp. 1-12, 2006. [8] C. Dwork, "Differential Privacy: A Survey of Results," Proc. Fifth Int'l Conf. Theory and Applications of Models of Computation (TAMC), PP. 1-19, 2008. [10] C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating Noise to Sensitivity in Private Data Analysis," Proc. Theory of Cryptography Conf. (TCC), pp. 265-284, 2006. [11] J.H. Friedman, J.L. Bentley, and R.A. Finkel, "An Algorithm for Finding Best Matches in Logarithmic Expected Time," ACM Trans. Math. Software, vol. 3, no. 3, pp. 209-226, 1977. [12] B.C.M. Fung, K. Wang, and P.S. Yu, "Top-Down Specialization for Information and Privacy Preservation," Proc. Intl Conf. Data Eng. (ICDE), pp. 205-216, 2005. [13] G. Ghinita, Y. Tao, and P. Kalnis, "On the Anonyrnization of Sparse High-Dimensional Data," Proc. IEEE 24th Int'l Conf. Data Eng. (ICDE), pp. 715-724,2008.