Data Renovation Algorithm for Protecting Sensitive Categorical Data
نویسندگان
چکیده
منابع مشابه
Protecting Sensitive Data on a PC by a Custom Algorithm
To store secrets and sensitive data in secure ways is necessary in the modern life. Since most hardware technologies used to store sensitive data are expensive for a single user, it is very common to store this kind of data by the means of software or software implemented encryption procedures. If for example the secret to protect is the secret key in a Public Key Infrastructure environment it ...
متن کاملA Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملAn Algorithm for Protecting Knowledge Discovery Data
In the paper, we present an algorithm that can be applied to protect data before a data mining process takes place. The data mining, a part of the knowledge discovery process, is mainly about building models from data. We address the following question: can we protect the data and still allow the data modelling process to take place? We consider the case where the distributions of original data...
متن کاملA Reliable Routing Algorithm for Delay Sensitive Data in Body Area Networks
Wireless body Area networks (WBANs) include a number of sensor nodes placed inside or on the human body to improve patient health and quality of life. Ensuring the transfer and receipt of data in sensitive data is a very important issue. Routing algorithms should support a variety of service quality such as reliability and delay in sending and receiving data. Loss of information or excessive da...
متن کاملProtecting Sensitive Knowledge By Data Sanitization
In this paper, we address the problem of protecting some sensitive knowledge in transactional databases. The challenge is on protecting actionable knowledge for strategic decisions, but at the same time not losing the great benefit of association rule mining. To accomplish that, we introduce a new, efficient one-scan algorithm that meets privacy protection and accuracy in association rule minin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2017
ISSN: 2321-9653
DOI: 10.22214/ijraset.2017.11145