CLOSENESS: A NEW PRIVACY MEASURE FOR DATA PUBLISHING

Slides:



Advertisements
Similar presentations
Study On Intelligent E-Shopping System Based On Data Mining
Advertisements

Bandwidth Estimation for IEEE Based Ad Hoc Networks.
The Transmission Control Protocol (TCP) carries most Internet traffic, so performance of the Internet depends to a great extent on how well TCP works.
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
A DISTRIBUTED CSMA ALGORITHM FOR THROUGHPUT AND UTILITY MAXIMIZATION IN WIRELESS NETWORKS.
Abstract There is significant need to improve existing techniques for clustering multivariate network traffic flow record and quickly infer underlying.
ABSTRACT Due to the Internets sheer size, complexity, and various routing policies, it is difficult if not impossible to locate the causes of large volumes.
WEB USAGE MINING FRAMEWORK FOR MINING EVOLVING USER PROFILES IN DYNAMIC WEBSITE DONE BY: AYESHA NUSRATH 07L51A0517 FIRDOUSE AFREEN 07L51A0522.
Under the Guidance of: Mr S.Karthikeyan.MCA..  The project is entitled as “ SMS Based Student Information System” created by using Visual Basic.  Flexible.
Toward a Statistical Framework for Source Anonymity in Sensor Networks.
Annotating Search Results from Web Databases. Abstract An increasing number of databases have become web accessible through HTML form-based search interfaces.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Personalized QoS-Aware Web Service Recommendation and Visualization.
Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs.
Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols.
Layered Approach using Conditional Random Fields For Intrusion Detection.
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment.
Understanding the External Links of Video Sharing Sites: Measurement and Analysis.
Security Evaluation of Pattern Classifiers under Attack.
Privacy Preserving Data Sharing With Anonymous ID Assignment
m-Privacy for Collaborative Data Publishing
Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development.
Optimal Client-Server Assignment for Internet Distributed Systems.
Protecting Sensitive Labels in Social Network Data Anonymization.
Identity-Based Secure Distributed Data Storage Schemes.
Incentive Compatible Privacy-Preserving Data Analysis.
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.
LARS*: An Efficient and Scalable Location-Aware Recommender System.
Anonymization of Centralized and Distributed Social Networks by Sequential Clustering.
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data.
Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage.
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links.
Privacy Preserving Delegated Access Control in Public Clouds.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
Video Data Hiding using Forbidden Zone and Selective Embedding Submitted Under Team Members.
Abstract With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial.
Facilitating Document Annotation using Content and Querying Value.
Privacy Preserving Back- Propagation Neural Network Learning Made Practical with Cloud Computing.
Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm.
Participatory Privacy: Enabling Privacy in Participatory Sensing
Preventing Private Information Inference Attacks on Social Networks.
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks.
Supporting Privacy Protection in Personalized Web Search.
Twitsper: Tweeting Privately. Abstract Although online social networks provide some form of privacy controls to protect a user's shared content from other.
m-Privacy for Collaborative Data Publishing
Attribute-Based Encryption With Verifiable Outsourced Decryption.
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud.
A New Algorithm for Inferring User Search Goals with Feedback Sessions.
Harnessing the Cloud for Securely Outsourcing Large- Scale Systems of Linear Equations.
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption.
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs.
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
Privacy-Preserving and Content-Protecting Location Based Queries.
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
Whole Test Suite Generation. Abstract Not all bugs lead to program crashes, and not always is there a formal specification to check the correctness of.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
APARTMENT MAINTENANCE SYSTEM M.Tech( Ph.D) HOD of C.S.E & I.T Dept.
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
Library Management System. Aim : To develop a project titled “LIBRARY MANAGEMENT” and is developed to maintain the operation done in a library. To develop.
ONLINE DETECTION AND PREVENTION PHISHING ATTACKS
RATION CARD MANAGEMENT SYSTEM
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
Spatial Approximate String Search. Abstract This work deals with the approximate string search in large spatial databases. Specifically, we investigate.
BY S.S.SUDHEER VARMA (13NT1D5816)
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
INFORMATION RETRIEVAL AND KNOWLEDGE MANAGEMENT SYSTEM
Department Of Computer Science Engineering
NYMBLE: BLOCKING MISBEHAVING USERS IN ANONYMIZING NETWORKS
Presented by : SaiVenkatanikhil Nimmagadda
Refined privacy models
Presentation transcript:

CLOSENESS: A NEW PRIVACY MEASURE FOR DATA PUBLISHING

ABSTRACT The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to certain “identifying” attributes) contains at least k records. Recently, several authors have recognized that k-anonymity cannot prevent attribute disclosure. The notion of `-diversity has been proposed to address this; `-diversity requires that each equivalence class has at least ` well-represented values for each sensitive attribute. we show that `-diversity has a number of limitations. In particular, it is neither necessary nor sufficient to prevent attribute disclosure. Motivated by these limitations, we propose a new notion of privacy called “closeness”. We first present the base model t- closeness, which requires that the distribution of a sensitive attribute in any equivalence class is close to the distribution of the attribute in the overall table (i.e., the distance between the two distributions should be no more than a threshold t). We then propose a more flexible privacy model called (n, t)-closeness that offers higher utility. We describe our desiderata for designing a distance measure between two probability distributions and present two distance measures. We discuss the rationale for using closeness as a privacy measure and illustrate its advantages through examples and experiments

EXISTING SYSTEM Before data publishing privacy called to set security code. Each and every person need to register and getting security code. This is the waste of time. Another one is the public semantic searching and getting result for public person. This public person is not considered anonymous. Clearly, the released data containing such information about individuals should not be considered anonymous. Sometimes getting information via searching in particular/filter particular name wise

PROPOSED SYSTEM Can’t visible full information for the public person. Incase public person search for a particular person information the result is each and every splitting data’s then blocking or set substring of asterisk (*) using l-diversion and closeness. Here public person or unauthorized person is considered anonymous. We can analyse how much percentage of possible privacy loss. Here is also available checking utility (EMD) analyse using Anonymization Algorithm. You can identify easy to see closeness ratio. L-diversion and closeness is very low the security mode very high. Incase l-diversion and closeness is very high the security mode is very low

MODULES Publishing privacy L-diversion and closeness Anonymization Algorithms Data Processing

HARDWARE SPECIFICATION Processor : Pentium IV 2.6 GHz Ram : 512 MB Hard Disk : 40 GB

SOFTWARE SPECIFICATION Operating System : Windows XP Front End : Java Back End : My SQL

THANK YOU