Using Clustering Approach Privacy Preserving Update to Anonymous and Confidential Databases

In this paper, the authors present two approaches one of that provided service for every incoming tuple for insertion even if that tuple fails the test of secure protocol of the private updating anonymous database by periodically extracting k-anonymous part of pending tuple set (i.e. all tuples that fail insertion). If k-anonymous part not available in pending tuple set means all tuples in pending tuple are unique then by using another approach to populate the pending tuple set as an anonymous by using the k-mean clustering algorithm and make every tuple identical in one cluster by suppressing as few as possible.

Provided by: International Journal of Computer Applications Topic: Data Management Date Added: Apr 2015 Format: PDF

Find By Topic