De-Identification Technology Involves Web Mining IJTSRD
Many data owners are required to release variety of data in real world application it has vital importance of discovery valuable information stay behind the data. However existing we focus on the de- identification policy which is the common privacy preserving approach. By using de-identification policy a continues balance between privacy protection and data utility […]