SlideShare a Scribd company logo
1 of 12
ANGEL: Enhancing the Utility of Generalization
For Privacy Preserving Publication

Synopsis
ABSTRACT
Generalization is a well-known method for privacy preserving
data publication. Despite its vast popularity, it has several drawbacks
such as heavy information loss, difficulty of supporting marginal
publication, and so on. To overcome these drawbacks, we develop
ANGEL, a new anonymization technique that is as effective as
generalization in privacy protection, but is able to retain significantly
more information in the micro data. ANGEL is applicable to any
monotonic principles (e.g., l-diversity, t-closeness, etc.), with its
superiority (in correlation preservation) especially obvious when tight
privacy control must be enforced. We show that ANGEL lends itself
elegantly to the hard problem of marginal publication. In particular,
unlike generalization that can release only restricted marginals, our
technique can be easily used to publish any marginals with strong
privacy guarantees.

OBJECTIVE OF THE PROJECT
1.1. EXISTING SYSTEM
It risk further shrinking the already limited pool of eligible
generalizations, and hence, would eventually be unable to feed the
public with useful scientific data.
K-anonymity thwarts the so-called presence attacks, where an
adversary obtains the precise QI-values of an individual, and wants to
find out whether this individual exists in the micro data. However, kanonymity alone provides weak protection against linking attacks.
DISADVANTAGES OF THE EXISTING SYSTEM:
 Heavy Information loss
 Does not Support the marginal publication
 No perfect Encryption Mechanism.

PROPOSED SYSTEM
 It develops new principles to give better privacy guarantees. For
instance, l-diversity is proposed to overcome the defects of kanonymity and yet, its own limitations led to t-closeness.
Privacy, however, is a natural foe of utility. A privacy-safer
principle reduces the number of selectable generalizations, thus
decreasing the chance of finding a utility-friendly generalization.
 ANGEL is applicable to any monotonic anonymization principle
(including k-anonymity l-diversity, t-closeness, etc.). Compared
to

traditional generalization, it ensures

the same privacy

guarantee but preserves significantly more information in the
micro data
 ANGEL is that it lends itself very nicely to marginal publication. It
easily supports the publication of any set of marginal’s, thus
settling a problem known to be very difficult with generalization.
KEY WORDS:

 Privacy
 Generalization
 Angel

PRIVACY:
Privacy is sometimes related to anonymity, the wish to remain
unnoticed or unidentified in the public realm. When something is
private to a person, it usually means there is something within them
that is considered inherently special or personally sensitive. The
degree to which private information is exposed therefore depends on
how the public will receive this information, which differs between
places and over time. Privacy is broader than security and includes the
concepts of appropriate use and protection of information.

GENERALIZATION:
Generalization is a popular method of thwarting linking attacks. It
works by replacing QI-values in the microdata with fuzzier forms. Also
generalization creates QI-groups, each of which consists of tuples with
identical

(generalized) QI-values. It is often convenient to regard

generalization as a point-to-rectangle transformation in the QI- space,
which is a space formed by all the QI attributes.
A microdata relation can be generalized in numerous ways. Various
generalizations, however, may provide drastically different privacy
protection. Hence, in practice, generalization needs to be guided by an
anonymization principle, which is a criterion deciding whether a table
has been adequately anonymized.

ANGEL -A NEW TOOL:

ANGEL, a new anonymization technique that overcomes all the above
problems. ANGEL is applicable to any monotonic anonymization
principle (including k-anonymity l-diversity, and t- closeness, etc.).
Compared to traditional generalization, it ensures the same privacy
guarantee,

but

preserves

significantly

more

information

in

the

microdata. The superiority of ANGEL is especially obvious when
stringent anonymity control is enforced. This is a highly desirable
feature

because,

the

community

continuously

invents

safer

anonymization principles that fix the vulnerabilities of the previous
ones. Another crucial feature of ANGEL is that it lends itself very nicely
to marginal publication. It easily supports the publication of any set of
marginals, thus settling a problem known to be very difficult with
generalization.
ANGEL supports all monotonic principles in exactly the same manner.
As a result, no adaptation effort is necessary when a publisher decides
to adopt a different principle. This is a significant advantage over the
previous solutions to marginal publication (which are “hard-wired” to
specific principles).
Problem in existing system:
A Critique of the Generalization/Suppression Approach to kAnonymity
k-Anonymity with
been shown to be
2005). Even how
suppression is an
diminish utility).

minimal generalization and local suppresion has
NP-hard (Meyerson et al., 2004; Aggarwal et al.,
to optimally combine generalization and local
open issue (careless combination may greatly

 Large Information Loss in Stringent Privacy Protection
 Marginal Publication

Drawbacks of generalization
Generalization alone poses several practical problems:
1. Cost of finding the optimal recoding: for an attribute with c
categories, there are possible generalizations.
2. Determining the subset of appropriate generalizations: which are
the new categories and which is the appropriate recoding between
old and new categories.
Example. When generalizing ZIP codes, recoding 08201 and 08205
into 0820* makes sense only if 0820* is meaningful as a location. For
the same reason, recoding 08201 and 08205 into 0*201 probably
lacks any geographical significance. So, automatic generalization is
thorny.
Furthermore, given a particular generalization rule, the literature
diverges on which records containing are recoded:
Global recoding: All occurrences of are recoded (µ-Argus).
Local recoding: Only some of the occurrences are recoded (Sweeney,
2002; Samarati 2001).
Some of the drawbacks of global recoding are:
1. It implies greater information loss.
2. The recoding suitable for a set of records may be unsuitable for
another set.

Local recoding is not without drawbacks either:
1. It is difficult to automate.

2. It complicates data analysis as old and new categories co-exist,
and an old category can be recoded into more than one new
category.

Solution Strategies :
ANGEL, a new anonymization technique that overcomes all the above
problems. ANGEL is applicable to any monotonic anonymization
principle (including k-anonymity l-diversity, t-closeness, etc.).
Compared to traditional generalization, it ensures the same privacy
guarantee but preserves significantly more information in the
microdata.
The superiority of ANGEL is especially obvious when stringent
anonymity control is enforced. This is a highly desirable feature
because the community continuously invents safer anonymization
principles that fix the vulnerabilities of the previous ones.
Another crucial feature of ANGEL is that it lends itself very nicely to
marginal publication. It easily supports the publication of any set of
marginals, thus settling a problem known to be very difficult with
generalization.
Furthermore, ANGEL supports all monotonic principles in exactly the
same manner. As a result, no adaptation effort is necessary when a
publisher decides to adopt a different principle. This is a significant
advantage over the previous solutions to marginal publication (which
are “hard-wired” to specific principles).
General Constraints:
The primary challenge of project management is to achieve all of the
project goals and objectives while honoring the preconceived project
constraints. Typical constraints are scope, time, and
secondary—and

more

ambitious—challenge

is

to

budget. The
optimize

the

allocation and integration of inputs necessary to meet pre-defined
objectives.
In project management, the term scope has two distinct uses: Project
Scope and Product Scope.
Project Scope "The work that needs to be accomplished to deliver a
product, service, or result with the specified features and functions."
Product Scope "The features and functions that characterize a
product, service, or result."
Time is part of the measuring system used to sequence events, to
compare the durations of events and the intervals between them, and
to quantify the motions of objects. Time has been a major subject of
religion, philosophy, and science, but defining it in a non-controversial
manner applicable to all fields of study has consistently eluded the
greatest scholars.

1.2. MODULE DESCRIPTION
 Angel
 Angelization
 Datasets
 Data Storage
 Mining
ANGEL:
This module involves the development of a new tool which
includes the following operations :
o Selection of a dataset
o Start mining
o Show Generalization
ANGELIZATION:
This is the working principle of Angel which is used to perform
the operations on a particular dataset. The data sets are first imported
on to the database and operations are performed on the database.
DATASETS`:
A data set (or dataset) is a collection of data, usually presented in
tabular form. Each column represents a particular variable. Each row
corresponds to a given member of the data set in question. Its values
for each of the variables, such as height and weight of an object or
values of random numbers. Each value is known as a datum. The data
set may comprise data for one or more members, corresponding to the
number of rows.
The datasets in this projects are most important things because they
contain the data in all the data formats.
DATA STORAGE:
This module shows the location of data that is stored in terms of:
o Min.Support
o Generalization time
o Storage Location
o Nodes
MINING:
A data set (or dataset) is a collection of data, usually
presented in tabular form. Each column represents a particular
variable. Each row corresponds to a given member of the data set in
question. Its values for each of the variables, such as height and
weight of an object or values of random numbers. Each value is known
as a datum. The data set may comprise data for one or more
members, corresponding to the number of rows.
Hardware Requirements

•

Hard disk

:

20 GB and above

•

RAM

:

256 MB and above

•

Processor speed

:

1.6 GHz and above

Software Requirements

•

Operating System :

Windows 2000/XP

•

Documentation Tool

:

•

Java

:

Jdk1.6

•

IDE

:

My Eclipse

Ms word 2000

More Related Content

Similar to Angel enhancing the utility of generalization for privacy preserving publication(synopsis)

SWARM OPTIMIZED MODULAR NEURAL NETWORK BASED DIAGNOSTIC SYSTEM FOR BREAST CAN...
SWARM OPTIMIZED MODULAR NEURAL NETWORK BASED DIAGNOSTIC SYSTEM FOR BREAST CAN...SWARM OPTIMIZED MODULAR NEURAL NETWORK BASED DIAGNOSTIC SYSTEM FOR BREAST CAN...
SWARM OPTIMIZED MODULAR NEURAL NETWORK BASED DIAGNOSTIC SYSTEM FOR BREAST CAN...ijscai
 
78201919
7820191978201919
78201919IJRAT
 
78201919
7820191978201919
78201919IJRAT
 
To The Deepest Convolutional Neural Networks
To The Deepest Convolutional Neural NetworksTo The Deepest Convolutional Neural Networks
To The Deepest Convolutional Neural NetworksaNumak & Company
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...IEEEGLOBALSOFTTECHNOLOGIES
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudIOSR Journals
 
An New Attractive Mage Technique Using L-Diversity
An New Attractive Mage Technique Using L-Diversity  An New Attractive Mage Technique Using L-Diversity
An New Attractive Mage Technique Using L-Diversity mlaij
 
Slicing%20 a%20new%20approach%20to%20privacy%20preserving%20data%20publishing
Slicing%20 a%20new%20approach%20to%20privacy%20preserving%20data%20publishingSlicing%20 a%20new%20approach%20to%20privacy%20preserving%20data%20publishing
Slicing%20 a%20new%20approach%20to%20privacy%20preserving%20data%20publishingSunkaraHariNarayana
 
A Rule based Slicing Approach to Achieve Data Publishing and Privacy
A Rule based Slicing Approach to Achieve Data Publishing and PrivacyA Rule based Slicing Approach to Achieve Data Publishing and Privacy
A Rule based Slicing Approach to Achieve Data Publishing and Privacyijsrd.com
 
Simple usability testing
Simple usability testingSimple usability testing
Simple usability testingHans Põldoja
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...1crore projects
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
ANONYMIZATION OF PRIVACY PRESERVATION
ANONYMIZATION OF PRIVACY PRESERVATIONANONYMIZATION OF PRIVACY PRESERVATION
ANONYMIZATION OF PRIVACY PRESERVATIONpharmaindexing
 

Similar to Angel enhancing the utility of generalization for privacy preserving publication(synopsis) (20)

F046043234
F046043234F046043234
F046043234
 
SWARM OPTIMIZED MODULAR NEURAL NETWORK BASED DIAGNOSTIC SYSTEM FOR BREAST CAN...
SWARM OPTIMIZED MODULAR NEURAL NETWORK BASED DIAGNOSTIC SYSTEM FOR BREAST CAN...SWARM OPTIMIZED MODULAR NEURAL NETWORK BASED DIAGNOSTIC SYSTEM FOR BREAST CAN...
SWARM OPTIMIZED MODULAR NEURAL NETWORK BASED DIAGNOSTIC SYSTEM FOR BREAST CAN...
 
78201919
7820191978201919
78201919
 
78201919
7820191978201919
78201919
 
To The Deepest Convolutional Neural Networks
To The Deepest Convolutional Neural NetworksTo The Deepest Convolutional Neural Networks
To The Deepest Convolutional Neural Networks
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
 
J017446568
J017446568J017446568
J017446568
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
 
Hy3414631468
Hy3414631468Hy3414631468
Hy3414631468
 
Hl3312951297
Hl3312951297Hl3312951297
Hl3312951297
 
An New Attractive Mage Technique Using L-Diversity
An New Attractive Mage Technique Using L-Diversity  An New Attractive Mage Technique Using L-Diversity
An New Attractive Mage Technique Using L-Diversity
 
Slicing%20 a%20new%20approach%20to%20privacy%20preserving%20data%20publishing
Slicing%20 a%20new%20approach%20to%20privacy%20preserving%20data%20publishingSlicing%20 a%20new%20approach%20to%20privacy%20preserving%20data%20publishing
Slicing%20 a%20new%20approach%20to%20privacy%20preserving%20data%20publishing
 
Sop slicing
Sop slicingSop slicing
Sop slicing
 
A Rule based Slicing Approach to Achieve Data Publishing and Privacy
A Rule based Slicing Approach to Achieve Data Publishing and PrivacyA Rule based Slicing Approach to Achieve Data Publishing and Privacy
A Rule based Slicing Approach to Achieve Data Publishing and Privacy
 
Simple usability testing
Simple usability testingSimple usability testing
Simple usability testing
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Steganography
SteganographySteganography
Steganography
 
ANONYMIZATION OF PRIVACY PRESERVATION
ANONYMIZATION OF PRIVACY PRESERVATIONANONYMIZATION OF PRIVACY PRESERVATION
ANONYMIZATION OF PRIVACY PRESERVATION
 

More from Mumbai Academisc

More from Mumbai Academisc (20)

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list
 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
 
Spring ppt
Spring pptSpring ppt
Spring ppt
 
Ejb notes
Ejb notesEjb notes
Ejb notes
 
Java web programming
Java web programmingJava web programming
Java web programming
 
Java programming-examples
Java programming-examplesJava programming-examples
Java programming-examples
 
Hibernate tutorial
Hibernate tutorialHibernate tutorial
Hibernate tutorial
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
 
Web based development
Web based developmentWeb based development
Web based development
 
Jdbc
JdbcJdbc
Jdbc
 
Java tutorial part 4
Java tutorial part 4Java tutorial part 4
Java tutorial part 4
 
Java tutorial part 3
Java tutorial part 3Java tutorial part 3
Java tutorial part 3
 
Java tutorial part 2
Java tutorial part 2Java tutorial part 2
Java tutorial part 2
 
Engineering
EngineeringEngineering
Engineering
 

Recently uploaded

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Angel enhancing the utility of generalization for privacy preserving publication(synopsis)

  • 1. ANGEL: Enhancing the Utility of Generalization For Privacy Preserving Publication Synopsis
  • 2. ABSTRACT Generalization is a well-known method for privacy preserving data publication. Despite its vast popularity, it has several drawbacks such as heavy information loss, difficulty of supporting marginal publication, and so on. To overcome these drawbacks, we develop ANGEL, a new anonymization technique that is as effective as generalization in privacy protection, but is able to retain significantly more information in the micro data. ANGEL is applicable to any monotonic principles (e.g., l-diversity, t-closeness, etc.), with its superiority (in correlation preservation) especially obvious when tight privacy control must be enforced. We show that ANGEL lends itself elegantly to the hard problem of marginal publication. In particular, unlike generalization that can release only restricted marginals, our technique can be easily used to publish any marginals with strong privacy guarantees. OBJECTIVE OF THE PROJECT
  • 3. 1.1. EXISTING SYSTEM It risk further shrinking the already limited pool of eligible generalizations, and hence, would eventually be unable to feed the public with useful scientific data. K-anonymity thwarts the so-called presence attacks, where an adversary obtains the precise QI-values of an individual, and wants to find out whether this individual exists in the micro data. However, kanonymity alone provides weak protection against linking attacks. DISADVANTAGES OF THE EXISTING SYSTEM:  Heavy Information loss  Does not Support the marginal publication  No perfect Encryption Mechanism. PROPOSED SYSTEM  It develops new principles to give better privacy guarantees. For instance, l-diversity is proposed to overcome the defects of kanonymity and yet, its own limitations led to t-closeness. Privacy, however, is a natural foe of utility. A privacy-safer principle reduces the number of selectable generalizations, thus decreasing the chance of finding a utility-friendly generalization.  ANGEL is applicable to any monotonic anonymization principle (including k-anonymity l-diversity, t-closeness, etc.). Compared to traditional generalization, it ensures the same privacy guarantee but preserves significantly more information in the micro data
  • 4.  ANGEL is that it lends itself very nicely to marginal publication. It easily supports the publication of any set of marginal’s, thus settling a problem known to be very difficult with generalization. KEY WORDS:  Privacy  Generalization  Angel PRIVACY: Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public realm. When something is private to a person, it usually means there is something within them that is considered inherently special or personally sensitive. The degree to which private information is exposed therefore depends on how the public will receive this information, which differs between places and over time. Privacy is broader than security and includes the concepts of appropriate use and protection of information. GENERALIZATION: Generalization is a popular method of thwarting linking attacks. It works by replacing QI-values in the microdata with fuzzier forms. Also generalization creates QI-groups, each of which consists of tuples with identical (generalized) QI-values. It is often convenient to regard generalization as a point-to-rectangle transformation in the QI- space, which is a space formed by all the QI attributes.
  • 5. A microdata relation can be generalized in numerous ways. Various generalizations, however, may provide drastically different privacy protection. Hence, in practice, generalization needs to be guided by an anonymization principle, which is a criterion deciding whether a table has been adequately anonymized. ANGEL -A NEW TOOL: ANGEL, a new anonymization technique that overcomes all the above problems. ANGEL is applicable to any monotonic anonymization principle (including k-anonymity l-diversity, and t- closeness, etc.). Compared to traditional generalization, it ensures the same privacy guarantee, but preserves significantly more information in the microdata. The superiority of ANGEL is especially obvious when stringent anonymity control is enforced. This is a highly desirable feature because, the community continuously invents safer anonymization principles that fix the vulnerabilities of the previous ones. Another crucial feature of ANGEL is that it lends itself very nicely to marginal publication. It easily supports the publication of any set of marginals, thus settling a problem known to be very difficult with generalization. ANGEL supports all monotonic principles in exactly the same manner. As a result, no adaptation effort is necessary when a publisher decides to adopt a different principle. This is a significant advantage over the previous solutions to marginal publication (which are “hard-wired” to specific principles).
  • 6. Problem in existing system: A Critique of the Generalization/Suppression Approach to kAnonymity k-Anonymity with been shown to be 2005). Even how suppression is an diminish utility). minimal generalization and local suppresion has NP-hard (Meyerson et al., 2004; Aggarwal et al., to optimally combine generalization and local open issue (careless combination may greatly  Large Information Loss in Stringent Privacy Protection  Marginal Publication Drawbacks of generalization Generalization alone poses several practical problems: 1. Cost of finding the optimal recoding: for an attribute with c categories, there are possible generalizations. 2. Determining the subset of appropriate generalizations: which are the new categories and which is the appropriate recoding between old and new categories. Example. When generalizing ZIP codes, recoding 08201 and 08205 into 0820* makes sense only if 0820* is meaningful as a location. For the same reason, recoding 08201 and 08205 into 0*201 probably lacks any geographical significance. So, automatic generalization is thorny. Furthermore, given a particular generalization rule, the literature diverges on which records containing are recoded: Global recoding: All occurrences of are recoded (µ-Argus). Local recoding: Only some of the occurrences are recoded (Sweeney, 2002; Samarati 2001).
  • 7. Some of the drawbacks of global recoding are: 1. It implies greater information loss. 2. The recoding suitable for a set of records may be unsuitable for another set. Local recoding is not without drawbacks either: 1. It is difficult to automate. 2. It complicates data analysis as old and new categories co-exist, and an old category can be recoded into more than one new category. Solution Strategies : ANGEL, a new anonymization technique that overcomes all the above problems. ANGEL is applicable to any monotonic anonymization principle (including k-anonymity l-diversity, t-closeness, etc.). Compared to traditional generalization, it ensures the same privacy guarantee but preserves significantly more information in the microdata. The superiority of ANGEL is especially obvious when stringent anonymity control is enforced. This is a highly desirable feature because the community continuously invents safer anonymization principles that fix the vulnerabilities of the previous ones.
  • 8. Another crucial feature of ANGEL is that it lends itself very nicely to marginal publication. It easily supports the publication of any set of marginals, thus settling a problem known to be very difficult with generalization. Furthermore, ANGEL supports all monotonic principles in exactly the same manner. As a result, no adaptation effort is necessary when a publisher decides to adopt a different principle. This is a significant advantage over the previous solutions to marginal publication (which are “hard-wired” to specific principles). General Constraints: The primary challenge of project management is to achieve all of the project goals and objectives while honoring the preconceived project constraints. Typical constraints are scope, time, and secondary—and more ambitious—challenge is to budget. The optimize the allocation and integration of inputs necessary to meet pre-defined objectives. In project management, the term scope has two distinct uses: Project Scope and Product Scope. Project Scope "The work that needs to be accomplished to deliver a product, service, or result with the specified features and functions." Product Scope "The features and functions that characterize a product, service, or result." Time is part of the measuring system used to sequence events, to compare the durations of events and the intervals between them, and to quantify the motions of objects. Time has been a major subject of religion, philosophy, and science, but defining it in a non-controversial
  • 9. manner applicable to all fields of study has consistently eluded the greatest scholars. 1.2. MODULE DESCRIPTION  Angel  Angelization  Datasets  Data Storage  Mining ANGEL: This module involves the development of a new tool which includes the following operations : o Selection of a dataset o Start mining o Show Generalization ANGELIZATION:
  • 10. This is the working principle of Angel which is used to perform the operations on a particular dataset. The data sets are first imported on to the database and operations are performed on the database. DATASETS`: A data set (or dataset) is a collection of data, usually presented in tabular form. Each column represents a particular variable. Each row corresponds to a given member of the data set in question. Its values for each of the variables, such as height and weight of an object or values of random numbers. Each value is known as a datum. The data set may comprise data for one or more members, corresponding to the number of rows. The datasets in this projects are most important things because they contain the data in all the data formats. DATA STORAGE: This module shows the location of data that is stored in terms of: o Min.Support o Generalization time o Storage Location o Nodes MINING: A data set (or dataset) is a collection of data, usually presented in tabular form. Each column represents a particular variable. Each row corresponds to a given member of the data set in question. Its values for each of the variables, such as height and weight of an object or values of random numbers. Each value is known
  • 11. as a datum. The data set may comprise data for one or more members, corresponding to the number of rows.
  • 12. Hardware Requirements • Hard disk : 20 GB and above • RAM : 256 MB and above • Processor speed : 1.6 GHz and above Software Requirements • Operating System : Windows 2000/XP • Documentation Tool : • Java : Jdk1.6 • IDE : My Eclipse Ms word 2000