ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Privacy Preserving Utility Verification Security of Data Published by Non Interactive Differentially Private Mechanisms

Journal: International Journal of Science and Research (IJSR) (Vol.6, No. 1)

Publication Date:

Authors : ; ;

Page : 2008-2010

Keywords : privacy; security; frequent itemset mining;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Service providers have the ability to collect large amounts of user data. Sometimes, a set of providers may try to aggregate their data for specific data mining tasks. In this process, how to protect users privacy is extremely critical. Number of user write an own novel, own story and own dataset, every user want to keep this data safe on own site and with user internet facility user always search a digital publisher. This is the so-called privacy-preserving collaborative data publishing problem. In this paper, we consider the collaborative data publishing problem for anonymizing horizontally partitioned data at multiple data providers. We consider a new type of insider attack by colluding data providers who may use their own data records (a subset of the overall data) to infer the data records contributed by other data providers. The paper addresses this new threat, and makes several contributions.

Last modified: 2021-06-30 17:35:27