De-Identification Technology Involves Web Mining IJTSRD


Many data owners are required to release variety of data in real world application it has vital importance of discovery valuable information stay behind the data. However existing we focus on the de- identification policy which is the common privacy preserving approach. By using de-identification policy a continues balance between privacy protection and data utility can be achieved by choosing the appropriate. We propose one parallel algorithm ‘œSKY FILTER POLICY GENERATOR’ that can be filtered the optimized data’ web ranking algorithm’ provide the user preferred data. Each user has their own privacy username and password, through the sky filter (data analytic operator) user willing data given to the user. Each user is identified by de identification policy.

by G. Sneka | H. Sharmila | R. Banumathi”De-Identification Technology Involves Web Mining”

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11484.pdf

http://www.ijtsrd.com/engineering/computer-engineering/11484/de-identification-technology-involves-web-mining/g-sneka

call for paper Environment Engineering, international journal Software Engineering, ugc approved journals for engineering




De-Identification Technology Involves Web Mining IJTSRD IEEE PAPER





2020 technology trends
2019-TOP-TECHNOLOGIES
2019 papers
2018-TOP-TECHNOLOGIES
2018 papers

IEEE PROJECTS 2019


IEEE PROJECTS CSE 2019
IEEE PROJECTS ECE 2019
IEEE PROJECTS EEE 2019
IEEE PROJECTS VLSI
IEEE PROJECTS EMBEDDED SYSTEM

IEEE PROJECTS


IEEE PROJECTS ECE
IEEE PROJECTS CSE COMPUTER SCIENCE
IEEE PROJECTS ELECTRICAL ENGINEERING
IEEE PROJECTS EEE

IEEE PROJECTS