SlideShare a Scribd company logo
1 of 7
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 120
DATA SLICING TECHNIQUE TO PRIVACY PRESERVING AND DATA
PUBLISHING
Alphonsa Vedangi1
, V.Anandam2
1
Student, 2
Professor, Department of CSE, CMR Institute of Technology, Hyderabad, Andhra Pradesh, India
alphonsa.vedangi@yahoo.com, velaanand@yahoo.com
Abstract
Many techniques have been designed for privacy preserving and micro data publishing, such as generalization and bucketization.
Several works showed that generalization loses some amount of information especially for high dimensional data. So it’s not efficient
for high dimensional data. In case of Bucketization, it does not prevents membership disclosure and also does not applicable for data
that do not have a clear separation between Quasi-identifying attributes and sensitive attributes. In this paper, we presenting an
innovative technique called data slicing which partitions the data. An efficient algorithm is developed for computing sliced data that
obeys l-diversity requirement. we also show how data slicing is better than generalization and bucketization. Data slicing preserves
better utility than generalization and also does not requires clear separation between Quasi-identifying and sensitive attributes. Data
slicing is also used to prevent attribute disclosure and develop an efficient algorithm for computing the sliced data that obeys l-
diversity requirement. Experimental results confirm that data slicing preserves data utility than generalization and more effective than
bucketization involving sensitive attributes. Experimental results demonstrate the effectiveness of this method.
Keywords –Privacy preserving, Data Security, Data Publishing, Microdata.
----------------------------------------------------------------------***-----------------------------------------------------------------------
1 INTRODUCTION
Privacy preserving microdata publishing has been studied
extensively in recent years. Today most of the organizations
need to publish microdata. Microdata contain records each of
which contains information about an individual entity, such as
a person or a household. Many microdata anonymization
techniques have been proposed and the most popular ones are
generalization with k-anonymity and bucketization with l-
diversity. In both methods attributes are into three categories,
some of them are identifiers that can be uniquely identified
such as Name or security number, some are quasi-identifiers.
These quasi–identifiers are set of attributes are those that in
combination can be linked with the external information to
reidentify such as birth date, sex and zip code and the third
category is sensitive attributes, this kind of attributes are
unknown to the opponent and are considered sensitive such as
disease and salary. These are three categories of attributes in
microdata. In both the anonymization techniques first
identifiers are removed from the data and then partitions the
tuples into buckets. Generalization transforms the quasi-
identifying values in each bucket into less specific and
semantically constant so that tuples in the same bucket cannot
be distinguished by their QI values. In bucketization, one
separates the SA values from the QI values by randomly
permuting the SA values in the bucket .The anonymized data
consist of a set of buckets with permuted sensitive attribute
values. The identity of patients must be protected when patient
data is shared .Previously we used techniques using k-
anonymity and l-diversity. Existing works mainly considers
datasets with a single sensitive attribute while patient data
consists multiple sensitive attributes such as diagnosis and
treatment. So both techniques are not so efficient for
preserving patient data. So, we are presenting a new technique
for preserving patient data and publishing by slicing the data
both horizontally and vertically. Data slicing can also be used
to prevent membership disclosure and is efficient for high
dimensional data and preserves better data utility.
1.1 Related Work
To improve the disclosure of the patient data and to preserve
better data utility sliced data is more efficient when compared
to generalization and bucketization. In case of generalization
[29, 31, 30], it is shown that generalization loses considerable
amount of information especially for high dimensional data. In
order to perform data analysis or data mining tasks on the
generalization table, the data analyst has to make the uniform
distribution assumption that every value in a generalized set is
equally possible and no other distribution assumption can be
justified. This significally reduces the data utility of the
generalized data. In generalizes table each attribute is
generalized separately, correlations between different
attributes are lost. This is an inherent problem of
generalization. In case of bucketization, it has better data
utility than generalization but does not prevent membership
disclosure. Secondly bucketization publishes the QI values in
their original forms, an opponent can easily find out whether
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 121
an individual has a record in the published data or not. This
means that membership information of most individuals can
be inferred from the bucketization table. Also bucketization
requires clear separation between QI and SI values .By
separating the sensitive attributes from the quasi-identifying
attributes, bucketization breaks the attribute correlation
between the QIs and SAs. However in many data sets it is
unclear that which attributes are QI’s and which SA’s are. So,
bucketization also not so efficient for preserving microdata
and publishing Slicing has some connections to marginal
publication [15], both of them release correlations among a set
of attributes. Slicing is quite different from marginal
publication. First, marginal publication can be viewed as a
special case of data slicing which does not have horizontal
partitioning. Therefore correlations among attributes in
different columns are lost in marginal publication.
2 BASIC IDEAS OF DATA SLICING
In this paper, we introduce a new method, called DATA
SLICING. This method partitions the data both horizontally
and vertically. Vertical partitioning is done by grouping
attributes into columns based on the correlations among the
attributes. Each column contains a subset of attributes that are
highly correlated. Horizontal partitioning is done by grouping
tuples into buckets. At last, within each bucket, values in each
column are randomly permutated to break the association
between different columns. The core idea of data slicing is to
break the association cross columns, but to preserve the
association within each column. This reduces the
dimensionality of the data and preserves better data utility than
bucketization and generalization. Data analysis methods such
as query answering can be easily viewed on sliced data.
2.1 Overview
The overall method of slicing has been discussed above. The
original microdata consist of quasi identifying values and
sensitive attributes. In figure 1 patient data in a hospital. The
data consists of Age, Sex, Zip code, disease. Here the QI
values are{age, sex, zip code} and the sensitive attribute is
{disease}.A generalized table replaces values
Figure 1: Original microdata published
In generalization there are several recodings.The recoding that
preserves the most information is “local recoding”. In local
recoding first tuples are grouped into buckets and then for
each bucket, one replaces all values of one attribute with a
generalized value, because same attribute value may be
generalized differently when they appear in different buckets.
Figure 2: Generalized data
In bucketization also attributes are partitioned into columns,
one column contains QI values and the other column contains
SA values. In bucketization, one separates the QI and SA
values by randomly permuting the SA values in each bucket.
In some cases we cannot determine the difference between
them two. So it has one drawback for microdata publishing. It
also does not prevent membership disclosure
Figure 3: Bucketized data
Slicing does not require the separation of those two attributes.
The basic idea of slicing is to break the association cross
columns, but to preserve the association within each column.
This reduces the dimensionality of data and preserves better
utility. Slicing partitions the dataset both horizontally and
vertically. Data slicing can also handle high-dimensional data.
It provides attribute disclosure protection.
Age Sex Zip code Disease
22 M 47906 Cancer
22 F 47906 Thyroid
33 F 47905 Thyroid
52 F 47905 Diabetes
54 M 47902 Thyroid
60 M 47902 Cancer
60 F 47904 Cancer
Age Sex Zip code Disease
[20-52]
[20-52]
[20-52]
[20-52]
*
*
*
*
4790*
4790*
4790*
4790*
Cancer
Thyroid
Thyroid
Diabetes
[54-64]
[54-64]
[54-64]
[54-64]
*
*
*
*
4790*
4790*
4790*
4790*
Cancer
Nausea
Cancer
Thyroid
Age Sex Zip code Disease
22
22
33
52
M
F
F
F
47906
47906
47905
47905
Thyroid
Cancer
iabetes
Thyroid
54
60
60
64
M
M
M
F
47902
47902
47902
47902
Nausea
Thyroid
Cancer
Cancer
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 122
Figure 4: Sliced data
3. SLICING ALGORITHM
Step 1: In the initial stage we consider a queue of buckets Q
and a set of sliced buckets SB. Initially Q contains
only one bucket which includes all tuples and SB is
empty. So Q={T};SB=∅.
Step 2: In each Iteration the algorithm removes a bucket from
Q and splits the bucket into two buckets. Q=Q-{B};
for l-diversity check(T,Q∪{B1,B2}∪SB,l);The main
part of tuple partitioning algorithm is to check
whether a sliced table satisfies l- diversity.
Step 3: In the diversity check algorithm for each tuple t, it
maintains a list of statistics L[t] contains Statistics
about one matching bucket B. t∈T,L[t]=∅.The
matching probability p(t,B) and the distribution of
candidate sensitive values D(t,B).
Step 4: Q=Q∪{B1,B2} here two buckets are moved to the end
of the Q
Step 5: else SB=SB∪{B} in this step we cannot split the
bucket more so the bucket is sent to SB
Step 6: Thus a final result return SB,here when Q becomes
empty we have Computed the sliced table. the set of
sliced buckets is SB .So, finally Return SB
3.1 Algorithm for Diversity-Check
Step 1: For each tuple t ∈ T, L[t]= ∅.
Step 2: For each bucket B in T.
Step 3: Record f(v) for each column value v in bucket B.
Step 4: For each tuple t ∈ T.
Step 5: Calculate P(t,B) and find D(t,B).
Step 6: L[t]= L[t] ∪ {hp(t,B),D(t,B) i}.
Step 7: for each tuple t ∈ T.
Step 8: Calculate p(t,s) for each s based on L[t].
Step 9: if p(t,s)≥1/L, return false.
Step 10: Return true,
4. ATTRIBUTE DISCLOSURE PROTECTION
Data slicing is used to prevent attribute disclosure, introducing
the notion of l-diverse slicing. The sliced table in figure4
satisfies 2-diversity.considering tuple t1 with QI
values(22,M,47906).In order to determine t1’s sensitive value
one has to check t1’s matching buckets. Consider an adversary
who knows all QI values of t and attempts to find out t
sensitive value from the sliced table. First let p(t,B) be the
probability that t is in bucket B. Then the adversary computes
p(t,s),the probability that t takes a sensitive value s.
specifically let p(s/t,B) be the probability that t takes sensitive
value s given that t is in bucket B,then according to law of
total probability p(t,s) is
P(t,s)= p t, B p , B (1)
P(t,B)=f(t,B)/f(t)
Once we computed p(t,B) and p(s/t,B) we can find out the
probability p(t,s) based on eq(1).
∑ p t, s = ∑ ∑ p t, B p , B =1 (2)
SO l-diverse slicing is based on the probability p(t,s).A tuple t
satisfies l-diversity iff for any sensitive value s, p(t,s)<=1/L.A
sliced table satisfies l-diversity iff every tuple in it satisfies l-
diversity.our analysis directly shows that from an l-diverse
slice table, An adversary cannot learn the sensitive value of
any individual with a probability greater than 1/L.
5. EXISTING SYSTEM
We have many privacy preserving techniques and conducted
extensive workload experiments. First, many existing
clustering algorithms like k-means requires the calculation of
centroids But there is no notion of centroids in our setting
where each attribute forms a data points in the clustering
space. Secondly, k-medoid method is very robust to the
existence of outliers that is the data points that are very far
away from the rest of the data points. Third, the order in which
the data points are examined and does not affect the clusters
computed from the k-medoid method.
5.1 Disadvantages:
1. Existing anonymization algorithms can be used for column
generalization.
2. Existing data analysis such as query answering methods can
be easily used on the sliced data.
3. Existing privacy measures for membership disclosure
protection include differential privacy and presence.
6. PROPOSED SYSTEM
We present a novel technique called slicing, which partitions
the data both horizontally and vertically. We show that slicing
preserves better data utility than can be used for membership
disclosure protection. Another important advantage of slicing
is that it can handle high dimensional data. We show how
slicing can be used for attribute disclosure protection and
(Age,Sex) (Zipcode, disease)
(22,M)
(22,F)
(33,F)
(52,F)
(47905,Thyroid)
(47906,Cancer)
(47905,Diabetes)
(47906,Thyroid)
(54,M)
(60,M)
(60,M)
(64,F)
(47904,Nausea)
(47902,Thyroid)
(47902,Cancer)
(47904,Cancer)
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 123
develop an efficient algorithm for computing the sliced data
that obey the l-diversity requirement. Slicing preserves better
utility than generalization and is more effective than
bucketization in workloads involving the sensitive attribute.
6.1 Advantages:
1. Slicing can be effectively used for preventing attribute
disclosure based on the privacy requirement of l-diversity.
2. Developing an efficient algorithm for computing the sliced
table that satisfies the l-diversity. Proposed algorithm
partitions attributes into columns applies column
generalization and partitions tuples into buckets. Attributes
that are highly correlated are in the same column.
7. EXPERIMENTAL RESULTS
Here we see how doctors and patients registers using their
details based on quasi-identifying attributes and sensitive
attributes. After registering doctor logins and see the patient
published details based on their diseases.
HOME DOTOR
REGISTER
PATIENT
REGISTER
DOCTOR
LOGIN
PATIENT
LOGIN
ADMIN
LOGIN
doctor register here
Doctor Id :
Username :
Password :
Designation :
Gender :
Date of birth :
Mobile :
City :
Zipcode :
Figure 7(a): Doctor Registration form
154Shiva
Shiva
MD
M
21-7-1970
6756898467
Hyderabad
345678
SUBMIT CLEAR
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 124
Figure 7(b): Patient registration forn
HOME DOCTOR
REGISTER
PATIENT
REGISTER
DOCTOR
LOGIN
PATIENT
LOGIN
ADMIN
LOGIN
DOCTOR LOGIN HERE
Username :
Password :
Figure 7(C): doctor login page
HOME DOTOR
REGISTE
R
PATIENT
REGISTE
R
DOCTOR
LOGIN
PATIENT
LOGIN
ADMIN
LOGIN
Patient register here
Patient Id :
Username :
Password :
Disease :
Gender :
Blood Group :
Date of birth :
Mobile :
City :
Zipcode :
HOME SEARCH
DISEASE
COMMON
DATA
CHANGE
PASSWORD
LOGOUT
PATIENT ID NAME DISEASE DOB AGE SEX ZIPCODE
454 Sita Fever 21/1/19** 20-30 F 600***
459 Ali Nausea 11/7/17** 40-50 M 600***
324 Raju Flu 02/5/17** 1-30 M 479***
Shiva
Shiva
SUBMIT
657Kiran
Kiran
Cancer
M
5-3-1976
7896543567
Vizag
897654
O +ve
SUBMIT CLEAR
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 125
Figure 7(d): Preserved data
Figure 7(e): Data Searching
Figure 7(f): published data
Figure 7(g): Sliced data
765 John Cancer 21/2/19** 1-40 M 467***
321 Swathi Fever 14/5/19** 10-30 F 600***
876 Harika Thyroid 12/8/18** 20-60 F 600***
564 Amir Cancer 2 22/4/19** 40-60 M 479***
234 David Diabetes 19/1/19** 30-60 M 600***
123 Geeta Nausea 16/5/19** 10-50 F 600***
932 Latha Thyroid 2 22/8/19** 1 20-70 F 479***
645 Priya Fever 1 16/1/19** 1 10-30 F 479***
HOME SEARCH
DISEASE
COMMON
DATA
CHANGE
PASSWORD
LOGOUT
Search User Details
Search Disease
HOME SEARCH
DISEASE
COMMON
DATA
CHANGE
PASSWORD
LOGOUT
PATIENT ID NAME DISEASE DOB AGE SEX ZIPCODE
454 Sita Fever 21/1/19** 20-30 F 600***
321 Swathi Fever 14/5/19** 10-30 F 600***
645 Priya Fever 1 16/1/19** 1 10-30 F 479***
HOME DATA SLICED CHANGE
PASSWORD
LOGOUT
PATIENT ID NAME A AGE,SEX ZIPCODE,DISEASE DELETE
454 Sita (20-30,F) (600045,Fever) Delete
459 Ali (40-50,M) (600045,Nausea) Delete
324 Raju (1-30,M) (479801,Flu) Delete
765 John (1-40,M) (467803,Cancer) Delete
321 Swathi (10-30,F) (600045,Fever) Delete
876 Harika (20-60,F)
(600032,Thyroid)
Delete
564 Amar 2 (40-60,M) (479863,Cancer) Delete
234 David (30-60,M) (600045,Diabetes) Delete
123 Geeta (10-50,F) (600045,Nausea) Delete
932 Latha 2 (20-70,F) 1
(479650,Thyroid)
Delete
645 Priya 1 (10-30,F) (479650,Fever) Delete
Fever
Search
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 126
8. FUTURE WORK
This proposed work motivates for several researches.
Basically in this paper we considered slicing where each
attribute is in exactly one column. The extension is the notion
of overlapping slicing which releases more attribute
correlations. One could choose to include the Disease attribute
in the first column also and the privacy implications need to be
carefully understood. This could provide better data utility.
The tradeoff between utility of data and data privacy is very
interesting. Finally, even though we are having many number
of anonymization technique, it remains a problem how to use
the anonymized data. In our work we randomly generated the
associations between column values of a bucket.
CONCLUSIONS
In this paper, we present a new anonymization method that is
data slicing for privacy preserving and data publishing. Data
Slicing overcomes the limitations of generalization and
bucketization and preserves better utility while protecting
against privacy threats. We illustrate that how slicing is used
to prevent attribute disclosures. The general methodology of
this work is before data anonymization one can analyze the
data characteristics in data anonymization. The basic idea is
one can easily design better anonymization techniques when
we know the data perfectly. Finally, we have showed some
advantages of data slicing comparing with generalization and
bucketization. Data slicing is a promising technique for
handling high dimensional data. By partitioning attributes into
columns, privacy is protected.
10 REFERENCES
[1]. G.Ghinita,Y.Tao,and P.Kalnis.On the anonymization of
sparse high-dimensional data. In ICDE,pages 715-
724,2008.
[2]. A.Inan,M.Kantarcioglu,and E.Bertino.Using
anonymized data for classification.In ICDE,2009 .
[3]. J.Brickell and V,Shmatikov.The cost of
privacy:destruction of data-mining utlity in anonymized
data publishing.In KDD,pages 70-78,2008.
[4]. J.Li,Y.Tao and X.Xiao.privation of proximity privacy
in publishing numerical sensitive data. In
SIGMOD,pages 473-486,2008.
[5]. R.C.-W.Wong,J.Li, A.W.-C. Fu, and K.Wang.(α,k)-
anonymity: an enhanced k-anonymity model for
privacy preserving data publishing.In KDD,pages 754-
759,2006.
[6]. V.Rastogi,D.Suciu,and S.Hong.The boundary between
privacy and utility in data publishing.In VLDB,pages
531-542,2007.
[7]. T.Li and N.Li. On the tradeoff between privacy and
utility in data publishing.In KDD,pages 517-526,2009.
[8]. K.LeFevre,D.DeWitt, and R.Ramakrishnan. Mondrian
mulyidimensional k-anonymity.In ICDE,page 25,2006.
[9]. T.Li and N.Li. On the trade off between privacy and
utility in data publishing .In KDD,pages517-526,2009.
BIOGRAPHIES
ALPHONSA VEDANGI, Department of
Computer Science and Engineering, CMR
Institute of Technology, Hyderabad With peer
guidance from staff completed the research.
Interested in researches and having first class
aggregate till masters.
V.ANANDAM, B.E, M.S., Ph.D, Professor at
CMR Institute of Technology, Department of
Computer Science, Hyderabad Having Peer
experience in teaching and administrative
experience in academic colleges Coupled with 26 years of
National and International project experience in high speed
computer controls in process engineering

More Related Content

What's hot

Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data miningeSAT Publishing House
 
A Rule based Slicing Approach to Achieve Data Publishing and Privacy
A Rule based Slicing Approach to Achieve Data Publishing and PrivacyA Rule based Slicing Approach to Achieve Data Publishing and Privacy
A Rule based Slicing Approach to Achieve Data Publishing and Privacyijsrd.com
 
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINEA NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINEaciijournal
 
Variance rover system web analytics tool using data
Variance rover system web analytics tool using dataVariance rover system web analytics tool using data
Variance rover system web analytics tool using dataeSAT Publishing House
 
Variance rover system
Variance rover systemVariance rover system
Variance rover systemeSAT Journals
 
IRJET - Random Data Perturbation Techniques in Privacy Preserving Data Mi...
IRJET -  	  Random Data Perturbation Techniques in Privacy Preserving Data Mi...IRJET -  	  Random Data Perturbation Techniques in Privacy Preserving Data Mi...
IRJET - Random Data Perturbation Techniques in Privacy Preserving Data Mi...IRJET Journal
 
Privacy Preserving of Data Mining Based on Enumeration and Concatenation of A...
Privacy Preserving of Data Mining Based on Enumeration and Concatenation of A...Privacy Preserving of Data Mining Based on Enumeration and Concatenation of A...
Privacy Preserving of Data Mining Based on Enumeration and Concatenation of A...AM Publications
 
An approach for discrimination prevention in data mining
An approach for discrimination prevention in data miningAn approach for discrimination prevention in data mining
An approach for discrimination prevention in data miningeSAT Publishing House
 
An approach for discrimination prevention in data mining
An approach for discrimination prevention in data miningAn approach for discrimination prevention in data mining
An approach for discrimination prevention in data miningeSAT Journals
 
Ijatcse71852019
Ijatcse71852019Ijatcse71852019
Ijatcse71852019loki536577
 
Upstate CSCI 525 Data Mining Chapter 3
Upstate CSCI 525 Data Mining Chapter 3Upstate CSCI 525 Data Mining Chapter 3
Upstate CSCI 525 Data Mining Chapter 3DanWooster1
 
OODM-object oriented data model
OODM-object oriented data modelOODM-object oriented data model
OODM-object oriented data modelAnilPokhrel7
 
TWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SET
TWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SETTWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SET
TWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SETIJDKP
 
Bca examination 2017 dbms
Bca examination 2017 dbmsBca examination 2017 dbms
Bca examination 2017 dbmsAnjaan Gajendra
 
A survey of memory based methods for collaborative filtering based techniques
A survey of memory based methods for collaborative filtering based techniquesA survey of memory based methods for collaborative filtering based techniques
A survey of memory based methods for collaborative filtering based techniquesIAEME Publication
 

What's hot (19)

Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data mining
 
A Rule based Slicing Approach to Achieve Data Publishing and Privacy
A Rule based Slicing Approach to Achieve Data Publishing and PrivacyA Rule based Slicing Approach to Achieve Data Publishing and Privacy
A Rule based Slicing Approach to Achieve Data Publishing and Privacy
 
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINEA NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
 
Variance rover system web analytics tool using data
Variance rover system web analytics tool using dataVariance rover system web analytics tool using data
Variance rover system web analytics tool using data
 
Variance rover system
Variance rover systemVariance rover system
Variance rover system
 
IRJET - Random Data Perturbation Techniques in Privacy Preserving Data Mi...
IRJET -  	  Random Data Perturbation Techniques in Privacy Preserving Data Mi...IRJET -  	  Random Data Perturbation Techniques in Privacy Preserving Data Mi...
IRJET - Random Data Perturbation Techniques in Privacy Preserving Data Mi...
 
Privacy Preserving of Data Mining Based on Enumeration and Concatenation of A...
Privacy Preserving of Data Mining Based on Enumeration and Concatenation of A...Privacy Preserving of Data Mining Based on Enumeration and Concatenation of A...
Privacy Preserving of Data Mining Based on Enumeration and Concatenation of A...
 
An approach for discrimination prevention in data mining
An approach for discrimination prevention in data miningAn approach for discrimination prevention in data mining
An approach for discrimination prevention in data mining
 
An approach for discrimination prevention in data mining
An approach for discrimination prevention in data miningAn approach for discrimination prevention in data mining
An approach for discrimination prevention in data mining
 
Ijatcse71852019
Ijatcse71852019Ijatcse71852019
Ijatcse71852019
 
Upstate CSCI 525 Data Mining Chapter 3
Upstate CSCI 525 Data Mining Chapter 3Upstate CSCI 525 Data Mining Chapter 3
Upstate CSCI 525 Data Mining Chapter 3
 
Saif_CCECE2007_full_paper_submitted
Saif_CCECE2007_full_paper_submittedSaif_CCECE2007_full_paper_submitted
Saif_CCECE2007_full_paper_submitted
 
OODM-object oriented data model
OODM-object oriented data modelOODM-object oriented data model
OODM-object oriented data model
 
TWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SET
TWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SETTWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SET
TWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SET
 
Data modeling dbms
Data modeling dbmsData modeling dbms
Data modeling dbms
 
Data Convergence White Paper
Data Convergence White PaperData Convergence White Paper
Data Convergence White Paper
 
Bca examination 2017 dbms
Bca examination 2017 dbmsBca examination 2017 dbms
Bca examination 2017 dbms
 
A survey of memory based methods for collaborative filtering based techniques
A survey of memory based methods for collaborative filtering based techniquesA survey of memory based methods for collaborative filtering based techniques
A survey of memory based methods for collaborative filtering based techniques
 
Chapter 3 Entity Relationship Model
Chapter 3 Entity Relationship ModelChapter 3 Entity Relationship Model
Chapter 3 Entity Relationship Model
 

Viewers also liked

Agile software development and challenges
Agile software development and challengesAgile software development and challenges
Agile software development and challengeseSAT Publishing House
 
Enhanced equally distributed load balancing algorithm for cloud computing
Enhanced equally distributed load balancing algorithm for cloud computingEnhanced equally distributed load balancing algorithm for cloud computing
Enhanced equally distributed load balancing algorithm for cloud computingeSAT Publishing House
 
Accelerted testing of deteriorated concrete structures due to carbonation
Accelerted testing of deteriorated concrete structures due to carbonationAccelerted testing of deteriorated concrete structures due to carbonation
Accelerted testing of deteriorated concrete structures due to carbonationeSAT Publishing House
 
Distance protection of hvdc transmission line with novel fault location techn...
Distance protection of hvdc transmission line with novel fault location techn...Distance protection of hvdc transmission line with novel fault location techn...
Distance protection of hvdc transmission line with novel fault location techn...eSAT Publishing House
 
Mhd effects on non newtonian micro polar fluid with
Mhd effects on non newtonian micro polar fluid withMhd effects on non newtonian micro polar fluid with
Mhd effects on non newtonian micro polar fluid witheSAT Publishing House
 
Analytical study and implementation of digital excitation system for diesel g...
Analytical study and implementation of digital excitation system for diesel g...Analytical study and implementation of digital excitation system for diesel g...
Analytical study and implementation of digital excitation system for diesel g...eSAT Publishing House
 
Fuzzified pso for multiobjective economic load
Fuzzified pso for multiobjective economic loadFuzzified pso for multiobjective economic load
Fuzzified pso for multiobjective economic loadeSAT Publishing House
 
Software testing effort estimation with cobb douglas function a practical app...
Software testing effort estimation with cobb douglas function a practical app...Software testing effort estimation with cobb douglas function a practical app...
Software testing effort estimation with cobb douglas function a practical app...eSAT Publishing House
 
Performance evaluation of proactive, reactive and
Performance evaluation of proactive, reactive andPerformance evaluation of proactive, reactive and
Performance evaluation of proactive, reactive andeSAT Publishing House
 
Effect of modulus of masonry on initial lateral stiffness of infilled frames ...
Effect of modulus of masonry on initial lateral stiffness of infilled frames ...Effect of modulus of masonry on initial lateral stiffness of infilled frames ...
Effect of modulus of masonry on initial lateral stiffness of infilled frames ...eSAT Publishing House
 
Flexural characteristics of sfrscc and sfrnc one way
Flexural characteristics of sfrscc and sfrnc one wayFlexural characteristics of sfrscc and sfrnc one way
Flexural characteristics of sfrscc and sfrnc one wayeSAT Publishing House
 
Efficient document compression using intra frame prediction tecthnique
Efficient document compression using intra frame prediction tecthniqueEfficient document compression using intra frame prediction tecthnique
Efficient document compression using intra frame prediction tecthniqueeSAT Publishing House
 
Design and development of high frequency resonant transition converter
Design and development of high frequency resonant transition converterDesign and development of high frequency resonant transition converter
Design and development of high frequency resonant transition convertereSAT Publishing House
 
Energy efficient task scheduling algorithms for cloud data centers
Energy efficient task scheduling algorithms for cloud data centersEnergy efficient task scheduling algorithms for cloud data centers
Energy efficient task scheduling algorithms for cloud data centerseSAT Publishing House
 
Seismic response of reinforced concrete structure by using different bracing ...
Seismic response of reinforced concrete structure by using different bracing ...Seismic response of reinforced concrete structure by using different bracing ...
Seismic response of reinforced concrete structure by using different bracing ...eSAT Publishing House
 
A novel method for detecting and characterizing low velocity impact (lvi) in ...
A novel method for detecting and characterizing low velocity impact (lvi) in ...A novel method for detecting and characterizing low velocity impact (lvi) in ...
A novel method for detecting and characterizing low velocity impact (lvi) in ...eSAT Publishing House
 
Review on “service granularity in service oriented
Review on “service granularity in service orientedReview on “service granularity in service oriented
Review on “service granularity in service orientedeSAT Publishing House
 
Hardback solution to accelerate multimedia computation through mgp in cmp
Hardback solution to accelerate multimedia computation through mgp in cmpHardback solution to accelerate multimedia computation through mgp in cmp
Hardback solution to accelerate multimedia computation through mgp in cmpeSAT Publishing House
 
Comparative analysis of multilevel inverter
Comparative analysis of multilevel inverterComparative analysis of multilevel inverter
Comparative analysis of multilevel invertereSAT Publishing House
 

Viewers also liked (20)

Agile software development and challenges
Agile software development and challengesAgile software development and challenges
Agile software development and challenges
 
Enhanced equally distributed load balancing algorithm for cloud computing
Enhanced equally distributed load balancing algorithm for cloud computingEnhanced equally distributed load balancing algorithm for cloud computing
Enhanced equally distributed load balancing algorithm for cloud computing
 
Accelerted testing of deteriorated concrete structures due to carbonation
Accelerted testing of deteriorated concrete structures due to carbonationAccelerted testing of deteriorated concrete structures due to carbonation
Accelerted testing of deteriorated concrete structures due to carbonation
 
Distance protection of hvdc transmission line with novel fault location techn...
Distance protection of hvdc transmission line with novel fault location techn...Distance protection of hvdc transmission line with novel fault location techn...
Distance protection of hvdc transmission line with novel fault location techn...
 
Mhd effects on non newtonian micro polar fluid with
Mhd effects on non newtonian micro polar fluid withMhd effects on non newtonian micro polar fluid with
Mhd effects on non newtonian micro polar fluid with
 
Analytical study and implementation of digital excitation system for diesel g...
Analytical study and implementation of digital excitation system for diesel g...Analytical study and implementation of digital excitation system for diesel g...
Analytical study and implementation of digital excitation system for diesel g...
 
Fuzzified pso for multiobjective economic load
Fuzzified pso for multiobjective economic loadFuzzified pso for multiobjective economic load
Fuzzified pso for multiobjective economic load
 
Software testing effort estimation with cobb douglas function a practical app...
Software testing effort estimation with cobb douglas function a practical app...Software testing effort estimation with cobb douglas function a practical app...
Software testing effort estimation with cobb douglas function a practical app...
 
Performance evaluation of proactive, reactive and
Performance evaluation of proactive, reactive andPerformance evaluation of proactive, reactive and
Performance evaluation of proactive, reactive and
 
Effect of modulus of masonry on initial lateral stiffness of infilled frames ...
Effect of modulus of masonry on initial lateral stiffness of infilled frames ...Effect of modulus of masonry on initial lateral stiffness of infilled frames ...
Effect of modulus of masonry on initial lateral stiffness of infilled frames ...
 
Flexural characteristics of sfrscc and sfrnc one way
Flexural characteristics of sfrscc and sfrnc one wayFlexural characteristics of sfrscc and sfrnc one way
Flexural characteristics of sfrscc and sfrnc one way
 
Efficient document compression using intra frame prediction tecthnique
Efficient document compression using intra frame prediction tecthniqueEfficient document compression using intra frame prediction tecthnique
Efficient document compression using intra frame prediction tecthnique
 
I am secure android application
I am secure android applicationI am secure android application
I am secure android application
 
Design and development of high frequency resonant transition converter
Design and development of high frequency resonant transition converterDesign and development of high frequency resonant transition converter
Design and development of high frequency resonant transition converter
 
Energy efficient task scheduling algorithms for cloud data centers
Energy efficient task scheduling algorithms for cloud data centersEnergy efficient task scheduling algorithms for cloud data centers
Energy efficient task scheduling algorithms for cloud data centers
 
Seismic response of reinforced concrete structure by using different bracing ...
Seismic response of reinforced concrete structure by using different bracing ...Seismic response of reinforced concrete structure by using different bracing ...
Seismic response of reinforced concrete structure by using different bracing ...
 
A novel method for detecting and characterizing low velocity impact (lvi) in ...
A novel method for detecting and characterizing low velocity impact (lvi) in ...A novel method for detecting and characterizing low velocity impact (lvi) in ...
A novel method for detecting and characterizing low velocity impact (lvi) in ...
 
Review on “service granularity in service oriented
Review on “service granularity in service orientedReview on “service granularity in service oriented
Review on “service granularity in service oriented
 
Hardback solution to accelerate multimedia computation through mgp in cmp
Hardback solution to accelerate multimedia computation through mgp in cmpHardback solution to accelerate multimedia computation through mgp in cmp
Hardback solution to accelerate multimedia computation through mgp in cmp
 
Comparative analysis of multilevel inverter
Comparative analysis of multilevel inverterComparative analysis of multilevel inverter
Comparative analysis of multilevel inverter
 

Similar to Data slicing technique to privacy preserving and data

The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data miningeSAT Journals
 
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMS
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMSSCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMS
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMSijdkp
 
IRJET-Efficient Data Linkage Technique using one Class Clustering Tree for Da...
IRJET-Efficient Data Linkage Technique using one Class Clustering Tree for Da...IRJET-Efficient Data Linkage Technique using one Class Clustering Tree for Da...
IRJET-Efficient Data Linkage Technique using one Class Clustering Tree for Da...IRJET Journal
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET Journal
 
ANONYMIZATION OF PRIVACY PRESERVATION
ANONYMIZATION OF PRIVACY PRESERVATIONANONYMIZATION OF PRIVACY PRESERVATION
ANONYMIZATION OF PRIVACY PRESERVATIONpharmaindexing
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudIOSR Journals
 
CLUSTERING DICHOTOMOUS DATA FOR HEALTH CARE
CLUSTERING DICHOTOMOUS DATA FOR HEALTH CARECLUSTERING DICHOTOMOUS DATA FOR HEALTH CARE
CLUSTERING DICHOTOMOUS DATA FOR HEALTH CAREijistjournal
 
Slicing%20 a%20new%20approach%20to%20privacy%20preserving%20data%20publishing
Slicing%20 a%20new%20approach%20to%20privacy%20preserving%20data%20publishingSlicing%20 a%20new%20approach%20to%20privacy%20preserving%20data%20publishing
Slicing%20 a%20new%20approach%20to%20privacy%20preserving%20data%20publishingSunkaraHariNarayana
 
Protection models
Protection modelsProtection models
Protection modelsG Prachi
 
IRJET- Privacy Preservation using Apache Spark
IRJET- Privacy Preservation using Apache SparkIRJET- Privacy Preservation using Apache Spark
IRJET- Privacy Preservation using Apache SparkIRJET Journal
 
NAD Vs MapReduce
NAD Vs MapReduceNAD Vs MapReduce
NAD Vs MapReduceHenry124586
 
IRJET - Survey on Clustering based Categorical Data Protection
IRJET - Survey on Clustering based Categorical Data ProtectionIRJET - Survey on Clustering based Categorical Data Protection
IRJET - Survey on Clustering based Categorical Data ProtectionIRJET Journal
 
Asif nosql
Asif nosqlAsif nosql
Asif nosqlAsif Ali
 

Similar to Data slicing technique to privacy preserving and data (20)

The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data mining
 
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMS
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMSSCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMS
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMS
 
Hy3414631468
Hy3414631468Hy3414631468
Hy3414631468
 
IRJET-Efficient Data Linkage Technique using one Class Clustering Tree for Da...
IRJET-Efficient Data Linkage Technique using one Class Clustering Tree for Da...IRJET-Efficient Data Linkage Technique using one Class Clustering Tree for Da...
IRJET-Efficient Data Linkage Technique using one Class Clustering Tree for Da...
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
 
ANONYMIZATION OF PRIVACY PRESERVATION
ANONYMIZATION OF PRIVACY PRESERVATIONANONYMIZATION OF PRIVACY PRESERVATION
ANONYMIZATION OF PRIVACY PRESERVATION
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
 
CLUSTERING DICHOTOMOUS DATA FOR HEALTH CARE
CLUSTERING DICHOTOMOUS DATA FOR HEALTH CARECLUSTERING DICHOTOMOUS DATA FOR HEALTH CARE
CLUSTERING DICHOTOMOUS DATA FOR HEALTH CARE
 
130509
130509130509
130509
 
130509
130509130509
130509
 
Slicing%20 a%20new%20approach%20to%20privacy%20preserving%20data%20publishing
Slicing%20 a%20new%20approach%20to%20privacy%20preserving%20data%20publishingSlicing%20 a%20new%20approach%20to%20privacy%20preserving%20data%20publishing
Slicing%20 a%20new%20approach%20to%20privacy%20preserving%20data%20publishing
 
Protection models
Protection modelsProtection models
Protection models
 
1234
12341234
1234
 
IRJET- Privacy Preservation using Apache Spark
IRJET- Privacy Preservation using Apache SparkIRJET- Privacy Preservation using Apache Spark
IRJET- Privacy Preservation using Apache Spark
 
Data Management.pptx
Data Management.pptxData Management.pptx
Data Management.pptx
 
NAD Vs MapReduce
NAD Vs MapReduceNAD Vs MapReduce
NAD Vs MapReduce
 
IRJET - Survey on Clustering based Categorical Data Protection
IRJET - Survey on Clustering based Categorical Data ProtectionIRJET - Survey on Clustering based Categorical Data Protection
IRJET - Survey on Clustering based Categorical Data Protection
 
Data Mining: Data Preprocessing
Data Mining: Data PreprocessingData Mining: Data Preprocessing
Data Mining: Data Preprocessing
 
Asif nosql
Asif nosqlAsif nosql
Asif nosql
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 

Data slicing technique to privacy preserving and data

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 120 DATA SLICING TECHNIQUE TO PRIVACY PRESERVING AND DATA PUBLISHING Alphonsa Vedangi1 , V.Anandam2 1 Student, 2 Professor, Department of CSE, CMR Institute of Technology, Hyderabad, Andhra Pradesh, India alphonsa.vedangi@yahoo.com, velaanand@yahoo.com Abstract Many techniques have been designed for privacy preserving and micro data publishing, such as generalization and bucketization. Several works showed that generalization loses some amount of information especially for high dimensional data. So it’s not efficient for high dimensional data. In case of Bucketization, it does not prevents membership disclosure and also does not applicable for data that do not have a clear separation between Quasi-identifying attributes and sensitive attributes. In this paper, we presenting an innovative technique called data slicing which partitions the data. An efficient algorithm is developed for computing sliced data that obeys l-diversity requirement. we also show how data slicing is better than generalization and bucketization. Data slicing preserves better utility than generalization and also does not requires clear separation between Quasi-identifying and sensitive attributes. Data slicing is also used to prevent attribute disclosure and develop an efficient algorithm for computing the sliced data that obeys l- diversity requirement. Experimental results confirm that data slicing preserves data utility than generalization and more effective than bucketization involving sensitive attributes. Experimental results demonstrate the effectiveness of this method. Keywords –Privacy preserving, Data Security, Data Publishing, Microdata. ----------------------------------------------------------------------***----------------------------------------------------------------------- 1 INTRODUCTION Privacy preserving microdata publishing has been studied extensively in recent years. Today most of the organizations need to publish microdata. Microdata contain records each of which contains information about an individual entity, such as a person or a household. Many microdata anonymization techniques have been proposed and the most popular ones are generalization with k-anonymity and bucketization with l- diversity. In both methods attributes are into three categories, some of them are identifiers that can be uniquely identified such as Name or security number, some are quasi-identifiers. These quasi–identifiers are set of attributes are those that in combination can be linked with the external information to reidentify such as birth date, sex and zip code and the third category is sensitive attributes, this kind of attributes are unknown to the opponent and are considered sensitive such as disease and salary. These are three categories of attributes in microdata. In both the anonymization techniques first identifiers are removed from the data and then partitions the tuples into buckets. Generalization transforms the quasi- identifying values in each bucket into less specific and semantically constant so that tuples in the same bucket cannot be distinguished by their QI values. In bucketization, one separates the SA values from the QI values by randomly permuting the SA values in the bucket .The anonymized data consist of a set of buckets with permuted sensitive attribute values. The identity of patients must be protected when patient data is shared .Previously we used techniques using k- anonymity and l-diversity. Existing works mainly considers datasets with a single sensitive attribute while patient data consists multiple sensitive attributes such as diagnosis and treatment. So both techniques are not so efficient for preserving patient data. So, we are presenting a new technique for preserving patient data and publishing by slicing the data both horizontally and vertically. Data slicing can also be used to prevent membership disclosure and is efficient for high dimensional data and preserves better data utility. 1.1 Related Work To improve the disclosure of the patient data and to preserve better data utility sliced data is more efficient when compared to generalization and bucketization. In case of generalization [29, 31, 30], it is shown that generalization loses considerable amount of information especially for high dimensional data. In order to perform data analysis or data mining tasks on the generalization table, the data analyst has to make the uniform distribution assumption that every value in a generalized set is equally possible and no other distribution assumption can be justified. This significally reduces the data utility of the generalized data. In generalizes table each attribute is generalized separately, correlations between different attributes are lost. This is an inherent problem of generalization. In case of bucketization, it has better data utility than generalization but does not prevent membership disclosure. Secondly bucketization publishes the QI values in their original forms, an opponent can easily find out whether
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 121 an individual has a record in the published data or not. This means that membership information of most individuals can be inferred from the bucketization table. Also bucketization requires clear separation between QI and SI values .By separating the sensitive attributes from the quasi-identifying attributes, bucketization breaks the attribute correlation between the QIs and SAs. However in many data sets it is unclear that which attributes are QI’s and which SA’s are. So, bucketization also not so efficient for preserving microdata and publishing Slicing has some connections to marginal publication [15], both of them release correlations among a set of attributes. Slicing is quite different from marginal publication. First, marginal publication can be viewed as a special case of data slicing which does not have horizontal partitioning. Therefore correlations among attributes in different columns are lost in marginal publication. 2 BASIC IDEAS OF DATA SLICING In this paper, we introduce a new method, called DATA SLICING. This method partitions the data both horizontally and vertically. Vertical partitioning is done by grouping attributes into columns based on the correlations among the attributes. Each column contains a subset of attributes that are highly correlated. Horizontal partitioning is done by grouping tuples into buckets. At last, within each bucket, values in each column are randomly permutated to break the association between different columns. The core idea of data slicing is to break the association cross columns, but to preserve the association within each column. This reduces the dimensionality of the data and preserves better data utility than bucketization and generalization. Data analysis methods such as query answering can be easily viewed on sliced data. 2.1 Overview The overall method of slicing has been discussed above. The original microdata consist of quasi identifying values and sensitive attributes. In figure 1 patient data in a hospital. The data consists of Age, Sex, Zip code, disease. Here the QI values are{age, sex, zip code} and the sensitive attribute is {disease}.A generalized table replaces values Figure 1: Original microdata published In generalization there are several recodings.The recoding that preserves the most information is “local recoding”. In local recoding first tuples are grouped into buckets and then for each bucket, one replaces all values of one attribute with a generalized value, because same attribute value may be generalized differently when they appear in different buckets. Figure 2: Generalized data In bucketization also attributes are partitioned into columns, one column contains QI values and the other column contains SA values. In bucketization, one separates the QI and SA values by randomly permuting the SA values in each bucket. In some cases we cannot determine the difference between them two. So it has one drawback for microdata publishing. It also does not prevent membership disclosure Figure 3: Bucketized data Slicing does not require the separation of those two attributes. The basic idea of slicing is to break the association cross columns, but to preserve the association within each column. This reduces the dimensionality of data and preserves better utility. Slicing partitions the dataset both horizontally and vertically. Data slicing can also handle high-dimensional data. It provides attribute disclosure protection. Age Sex Zip code Disease 22 M 47906 Cancer 22 F 47906 Thyroid 33 F 47905 Thyroid 52 F 47905 Diabetes 54 M 47902 Thyroid 60 M 47902 Cancer 60 F 47904 Cancer Age Sex Zip code Disease [20-52] [20-52] [20-52] [20-52] * * * * 4790* 4790* 4790* 4790* Cancer Thyroid Thyroid Diabetes [54-64] [54-64] [54-64] [54-64] * * * * 4790* 4790* 4790* 4790* Cancer Nausea Cancer Thyroid Age Sex Zip code Disease 22 22 33 52 M F F F 47906 47906 47905 47905 Thyroid Cancer iabetes Thyroid 54 60 60 64 M M M F 47902 47902 47902 47902 Nausea Thyroid Cancer Cancer
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 122 Figure 4: Sliced data 3. SLICING ALGORITHM Step 1: In the initial stage we consider a queue of buckets Q and a set of sliced buckets SB. Initially Q contains only one bucket which includes all tuples and SB is empty. So Q={T};SB=∅. Step 2: In each Iteration the algorithm removes a bucket from Q and splits the bucket into two buckets. Q=Q-{B}; for l-diversity check(T,Q∪{B1,B2}∪SB,l);The main part of tuple partitioning algorithm is to check whether a sliced table satisfies l- diversity. Step 3: In the diversity check algorithm for each tuple t, it maintains a list of statistics L[t] contains Statistics about one matching bucket B. t∈T,L[t]=∅.The matching probability p(t,B) and the distribution of candidate sensitive values D(t,B). Step 4: Q=Q∪{B1,B2} here two buckets are moved to the end of the Q Step 5: else SB=SB∪{B} in this step we cannot split the bucket more so the bucket is sent to SB Step 6: Thus a final result return SB,here when Q becomes empty we have Computed the sliced table. the set of sliced buckets is SB .So, finally Return SB 3.1 Algorithm for Diversity-Check Step 1: For each tuple t ∈ T, L[t]= ∅. Step 2: For each bucket B in T. Step 3: Record f(v) for each column value v in bucket B. Step 4: For each tuple t ∈ T. Step 5: Calculate P(t,B) and find D(t,B). Step 6: L[t]= L[t] ∪ {hp(t,B),D(t,B) i}. Step 7: for each tuple t ∈ T. Step 8: Calculate p(t,s) for each s based on L[t]. Step 9: if p(t,s)≥1/L, return false. Step 10: Return true, 4. ATTRIBUTE DISCLOSURE PROTECTION Data slicing is used to prevent attribute disclosure, introducing the notion of l-diverse slicing. The sliced table in figure4 satisfies 2-diversity.considering tuple t1 with QI values(22,M,47906).In order to determine t1’s sensitive value one has to check t1’s matching buckets. Consider an adversary who knows all QI values of t and attempts to find out t sensitive value from the sliced table. First let p(t,B) be the probability that t is in bucket B. Then the adversary computes p(t,s),the probability that t takes a sensitive value s. specifically let p(s/t,B) be the probability that t takes sensitive value s given that t is in bucket B,then according to law of total probability p(t,s) is P(t,s)= p t, B p , B (1) P(t,B)=f(t,B)/f(t) Once we computed p(t,B) and p(s/t,B) we can find out the probability p(t,s) based on eq(1). ∑ p t, s = ∑ ∑ p t, B p , B =1 (2) SO l-diverse slicing is based on the probability p(t,s).A tuple t satisfies l-diversity iff for any sensitive value s, p(t,s)<=1/L.A sliced table satisfies l-diversity iff every tuple in it satisfies l- diversity.our analysis directly shows that from an l-diverse slice table, An adversary cannot learn the sensitive value of any individual with a probability greater than 1/L. 5. EXISTING SYSTEM We have many privacy preserving techniques and conducted extensive workload experiments. First, many existing clustering algorithms like k-means requires the calculation of centroids But there is no notion of centroids in our setting where each attribute forms a data points in the clustering space. Secondly, k-medoid method is very robust to the existence of outliers that is the data points that are very far away from the rest of the data points. Third, the order in which the data points are examined and does not affect the clusters computed from the k-medoid method. 5.1 Disadvantages: 1. Existing anonymization algorithms can be used for column generalization. 2. Existing data analysis such as query answering methods can be easily used on the sliced data. 3. Existing privacy measures for membership disclosure protection include differential privacy and presence. 6. PROPOSED SYSTEM We present a novel technique called slicing, which partitions the data both horizontally and vertically. We show that slicing preserves better data utility than can be used for membership disclosure protection. Another important advantage of slicing is that it can handle high dimensional data. We show how slicing can be used for attribute disclosure protection and (Age,Sex) (Zipcode, disease) (22,M) (22,F) (33,F) (52,F) (47905,Thyroid) (47906,Cancer) (47905,Diabetes) (47906,Thyroid) (54,M) (60,M) (60,M) (64,F) (47904,Nausea) (47902,Thyroid) (47902,Cancer) (47904,Cancer)
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 123 develop an efficient algorithm for computing the sliced data that obey the l-diversity requirement. Slicing preserves better utility than generalization and is more effective than bucketization in workloads involving the sensitive attribute. 6.1 Advantages: 1. Slicing can be effectively used for preventing attribute disclosure based on the privacy requirement of l-diversity. 2. Developing an efficient algorithm for computing the sliced table that satisfies the l-diversity. Proposed algorithm partitions attributes into columns applies column generalization and partitions tuples into buckets. Attributes that are highly correlated are in the same column. 7. EXPERIMENTAL RESULTS Here we see how doctors and patients registers using their details based on quasi-identifying attributes and sensitive attributes. After registering doctor logins and see the patient published details based on their diseases. HOME DOTOR REGISTER PATIENT REGISTER DOCTOR LOGIN PATIENT LOGIN ADMIN LOGIN doctor register here Doctor Id : Username : Password : Designation : Gender : Date of birth : Mobile : City : Zipcode : Figure 7(a): Doctor Registration form 154Shiva Shiva MD M 21-7-1970 6756898467 Hyderabad 345678 SUBMIT CLEAR
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 124 Figure 7(b): Patient registration forn HOME DOCTOR REGISTER PATIENT REGISTER DOCTOR LOGIN PATIENT LOGIN ADMIN LOGIN DOCTOR LOGIN HERE Username : Password : Figure 7(C): doctor login page HOME DOTOR REGISTE R PATIENT REGISTE R DOCTOR LOGIN PATIENT LOGIN ADMIN LOGIN Patient register here Patient Id : Username : Password : Disease : Gender : Blood Group : Date of birth : Mobile : City : Zipcode : HOME SEARCH DISEASE COMMON DATA CHANGE PASSWORD LOGOUT PATIENT ID NAME DISEASE DOB AGE SEX ZIPCODE 454 Sita Fever 21/1/19** 20-30 F 600*** 459 Ali Nausea 11/7/17** 40-50 M 600*** 324 Raju Flu 02/5/17** 1-30 M 479*** Shiva Shiva SUBMIT 657Kiran Kiran Cancer M 5-3-1976 7896543567 Vizag 897654 O +ve SUBMIT CLEAR
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 125 Figure 7(d): Preserved data Figure 7(e): Data Searching Figure 7(f): published data Figure 7(g): Sliced data 765 John Cancer 21/2/19** 1-40 M 467*** 321 Swathi Fever 14/5/19** 10-30 F 600*** 876 Harika Thyroid 12/8/18** 20-60 F 600*** 564 Amir Cancer 2 22/4/19** 40-60 M 479*** 234 David Diabetes 19/1/19** 30-60 M 600*** 123 Geeta Nausea 16/5/19** 10-50 F 600*** 932 Latha Thyroid 2 22/8/19** 1 20-70 F 479*** 645 Priya Fever 1 16/1/19** 1 10-30 F 479*** HOME SEARCH DISEASE COMMON DATA CHANGE PASSWORD LOGOUT Search User Details Search Disease HOME SEARCH DISEASE COMMON DATA CHANGE PASSWORD LOGOUT PATIENT ID NAME DISEASE DOB AGE SEX ZIPCODE 454 Sita Fever 21/1/19** 20-30 F 600*** 321 Swathi Fever 14/5/19** 10-30 F 600*** 645 Priya Fever 1 16/1/19** 1 10-30 F 479*** HOME DATA SLICED CHANGE PASSWORD LOGOUT PATIENT ID NAME A AGE,SEX ZIPCODE,DISEASE DELETE 454 Sita (20-30,F) (600045,Fever) Delete 459 Ali (40-50,M) (600045,Nausea) Delete 324 Raju (1-30,M) (479801,Flu) Delete 765 John (1-40,M) (467803,Cancer) Delete 321 Swathi (10-30,F) (600045,Fever) Delete 876 Harika (20-60,F) (600032,Thyroid) Delete 564 Amar 2 (40-60,M) (479863,Cancer) Delete 234 David (30-60,M) (600045,Diabetes) Delete 123 Geeta (10-50,F) (600045,Nausea) Delete 932 Latha 2 (20-70,F) 1 (479650,Thyroid) Delete 645 Priya 1 (10-30,F) (479650,Fever) Delete Fever Search
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 126 8. FUTURE WORK This proposed work motivates for several researches. Basically in this paper we considered slicing where each attribute is in exactly one column. The extension is the notion of overlapping slicing which releases more attribute correlations. One could choose to include the Disease attribute in the first column also and the privacy implications need to be carefully understood. This could provide better data utility. The tradeoff between utility of data and data privacy is very interesting. Finally, even though we are having many number of anonymization technique, it remains a problem how to use the anonymized data. In our work we randomly generated the associations between column values of a bucket. CONCLUSIONS In this paper, we present a new anonymization method that is data slicing for privacy preserving and data publishing. Data Slicing overcomes the limitations of generalization and bucketization and preserves better utility while protecting against privacy threats. We illustrate that how slicing is used to prevent attribute disclosures. The general methodology of this work is before data anonymization one can analyze the data characteristics in data anonymization. The basic idea is one can easily design better anonymization techniques when we know the data perfectly. Finally, we have showed some advantages of data slicing comparing with generalization and bucketization. Data slicing is a promising technique for handling high dimensional data. By partitioning attributes into columns, privacy is protected. 10 REFERENCES [1]. G.Ghinita,Y.Tao,and P.Kalnis.On the anonymization of sparse high-dimensional data. In ICDE,pages 715- 724,2008. [2]. A.Inan,M.Kantarcioglu,and E.Bertino.Using anonymized data for classification.In ICDE,2009 . [3]. J.Brickell and V,Shmatikov.The cost of privacy:destruction of data-mining utlity in anonymized data publishing.In KDD,pages 70-78,2008. [4]. J.Li,Y.Tao and X.Xiao.privation of proximity privacy in publishing numerical sensitive data. In SIGMOD,pages 473-486,2008. [5]. R.C.-W.Wong,J.Li, A.W.-C. Fu, and K.Wang.(α,k)- anonymity: an enhanced k-anonymity model for privacy preserving data publishing.In KDD,pages 754- 759,2006. [6]. V.Rastogi,D.Suciu,and S.Hong.The boundary between privacy and utility in data publishing.In VLDB,pages 531-542,2007. [7]. T.Li and N.Li. On the tradeoff between privacy and utility in data publishing.In KDD,pages 517-526,2009. [8]. K.LeFevre,D.DeWitt, and R.Ramakrishnan. Mondrian mulyidimensional k-anonymity.In ICDE,page 25,2006. [9]. T.Li and N.Li. On the trade off between privacy and utility in data publishing .In KDD,pages517-526,2009. BIOGRAPHIES ALPHONSA VEDANGI, Department of Computer Science and Engineering, CMR Institute of Technology, Hyderabad With peer guidance from staff completed the research. Interested in researches and having first class aggregate till masters. V.ANANDAM, B.E, M.S., Ph.D, Professor at CMR Institute of Technology, Department of Computer Science, Hyderabad Having Peer experience in teaching and administrative experience in academic colleges Coupled with 26 years of National and International project experience in high speed computer controls in process engineering