International Journal of Innovative Research in Engineering and Management
Year: 2015, Volume: 3, Issue: 4
First page : ( 33) Last page : ( 36)
Online ISSN : 2350-0557.
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Vidya Ingle
In today’s world data is collected for various purposes. The collected data includes personal details or some other confidential information. Database is a collection of data that can be accessed, updated and it enables user to retrieve data. Providing security to these databases is big issue now days. Today online information is stored for almost everything like-Online admission, online banking, online shopping, E-Health service and social networking etc. This information can be used by insurance companies, drug manufacturing companies and various other marketing agencies without consent of the data provider. To maintain confidentiality, unauthorized third parties must be prevented from accessing and viewing data. It is also essential to maintain database integrity while data is transferring from source to destination. Suppose the data owner wants to share the data with researchers or analysts, how can a data owner technically insure that the individuals who are the subjects of the data cannot be re- identified while the data remain practically useful? Various anonymization techniques, like suppression, generalization and bucketization are designed for preserving privacy of published data. Generalization loses significant amount of information especially for large volume of data and bucketization is not sufficient prevent membership disclosure and cannot be used for data where quasi-identifying attributes and sensitive attributes cannot be clearly separated. . Slicing is new privacy preserving technique which provides improved data utility than generalization and is more efficient in workload pertaining to the sensitive attribute
[1] Tiancheng Li,Ninghuli Li,Jian Zhang,Ian Molloy, Slicing: A new approach for privacy preserving data publishing,IEEE transactions on knowledge and data engineering,vol 24,no 3,march 2012.
[2] Alberto Trombetta, Wei Jiang, Elisa Bertino and Lorenzo Bossi , Privacy –Preserving Updates to Anonymous and Confidential Databases, IEEE, 2011.
[3] Ninghui Li, Tiancheng Li,Suresh Venkatasubramanian,t-Closeness: Privacy Beyond k-Anonymity and _-Diversity, IEEE 23rd International Conference on Data Engineering, 2007
[4] Ashwin Machanavajjhala Johannes Gehrke Daniel Kifer Muthuramakrishnan Venkitasubramaniam, â„“-Diversity: Privacy beyond k-Anonymity, 22’nd Int’l Conf.Data Engineering, 2006.
[5] A. Trombetta, E. Bertino. Private updates to anonymous databases. In Proc. Int’l Conf. on Data Engineering (ICDE), Georgia, US, 2006.
[6] L. Sweeney. K-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5), 557–570, 2002.
Department of Information Technology, Mumbai University/ Pillai’s Institute of information Technology, New Panvel/ Navi Mumbai,India, (e-mail: inglevidya@rediffmail.com).
No. of Downloads: 8 | No. of Views: 1185
Anmol Chauhan, Sana Rabbani, Devendra Agarwal, Nikhat Akhtar, Yusuf Perwej.
July 2024 - Vol 12, Issue 4
Dr S. A. Talekar, Shravani A. Lajurkar, Divya S. Patil, Rutika A. Benke, Pranjal A. Kunde.
May 2024 - Vol 12, Issue 3
Dr. Deepika Rani.
May 2024 - Vol 12, Issue 3