Identification of K- Tuples using K-Anonymity Algorithm to the Watermarking of Social Network Database

Print
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Rajneeshkaur Bedi, Anjali Mahajan
10.5120/ijca2016909968

Rajneeshkaur Bedi and Anjali Mahajan. Identification of K- Tuples using K-Anonymity Algorithm to the Watermarking of Social Network Database. International Journal of Computer Applications 142(14):1-7, May 2016. BibTeX

@article{10.5120/ijca2016909968,
	author = {Rajneeshkaur Bedi and Anjali Mahajan},
	title = {Identification of K- Tuples using K-Anonymity Algorithm to the Watermarking of Social Network Database},
	journal = {International Journal of Computer Applications},
	issue_date = {May 2016},
	volume = {142},
	number = {14},
	month = {May},
	year = {2016},
	issn = {0975-8887},
	pages = {1-7},
	numpages = {7},
	url = {http://www.ijcaonline.org/archives/volume142/number14/24961-2016909968},
	doi = {10.5120/ijca2016909968},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Nowadays digital data is increasing and securing these assets is vital. Generating and distribution of digital content via Internet has raised many opportunity for good and bad reasons. Many cases on piracy and privacy are registered for falsification, tampering or forgery on digital data like database, multimedia, document etc. And most important is to protect personal privacy. In view of, these two problems of piracy and privacy our research focused in identification of k-tuples using k-anonyminity algorithm and watermarking them. Here, privacy preserved K-anonymity algorithm is modified and developed to identify the sensitive attributes to transfer to other parties after solving the privacy issues. Then, the sensitive attribute is modified to preserve the privacy in a way that to handle the piracy of database. This provides additional advantage of copyright protection along with privacy preservation. After exact identification the sensitive tuples by the k-anonymity algorithm, the tuples will be watermarked based on our embedding procedure.

References

  1. RashmiA.Zilpelwar, RajneeshkaurK.Bedi and Vijay M.Wadhai, “An Overview of Privacy and Security in SNS”, International Journal of P2P Network Trends and Technology, vol. 2, no. 1, p p.23-26, 2012.
  2. Purva Gujarathi, Rajneesh Kaur Bedi, Poonam Gundecha and Ashish Kulkarni, “A Unique Approach for Watermarking Non-numeric Relational Database”, International Journal of Computer Applications, vol. 36, no.7, p p.9-14, December 2011.
  3. Anita Thengade, RajneeshkaurBedi, and Vijay M.Wadhai, “A New Watermarking Approach for Non-numeric Relational Database”, International Journal of Computer Applications, vol. 13, no.7, p p.37-40, January 2011.
  4. Mohammad Rasool Sarrafi Aghdam and Noboru Sonehara, “On enhancing data utility in k-anonymization for data without hierarchical taxonomies”, International Journal of Cyber-Security and Digital Forensics, vol. 2, no. 2, p p. 12-22, 2013.
  5. K. P. Kaliyamurthie, D. Parameswari and R. Udayakumar, “k-anonymity Based Privacy Preserving for Data Collection in Wireless Sensor Networks”, Indian Journal of Science and Technology, vol 6, no. 5S, p p. 4604-4613, May 2013.
  6. Bruce Kapron, Gautam Srivastava and S. Venkatesh, “Social Network Anonymization via Edge Addition”, Advances in Social Networks Analysis and Mining (ASONAM), vol.1, no.8, p p.155-162, july 2011.
  7. Traian Marius Truta and Alina Campan, “K-Anonymization Incremental Maintenance and Optimization Techniques”, ACM symposium on Applied computing, vol. 1, no. 4, p p. 380-387, 2007.
  8. Michael Hay, Gerome Miklau and David Jensen, “Anonymizing Social Networks”, Security and Privacy, vol.11, p p.173-198, 2009.
  9. V.Thavavel and S.Sivakumar, “A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment”, International Journal of Computer Science Issues, vol. 9, no. 2, p p. 434-441,January 2012.
  10. Mohamed Y. Eltabakh, Jalaja Padma, Yasin N. Silva and Elisa Bertino, “Query Processing with K-Anonymity”, International Journal of Data Engineering, vol. 3, no. 2, p p. 48-65, 2012.
  11. Latanya Sweeney, “Achieving k-anonymity privacy protection using generalization and suppression”, International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, vol.10, no. 5, p p. 571-588, 2002.
  12. Athanasios Nikolaidis and Ioannis Pitas, “Region-Based Image Watermarking”, IEEE transactions on image processing, vol. 10, no. 11, p p.1726-1740, november 2001.
  13. Aaron Beach, Mike Gartrell and Richard Han, “Social-K: Real-Time K-Anonymity Guarantees for Social Network Applications”, International Association of Computer Science and Information Technology, vol. 28, p p.101-106, 2011.
  14. Nagarjuna. Settipalli and Manjula, “Securing Watermarked-Relational Data by Using Encryption and Decryption”, RPN Journal of Systems and Software, vol.1, no.2, p p.70-74, 2011.
  15. Jian, W., L. Yongcheng, J. Shuo and L. Jiajin,” A survey on anonymity-based privacy preserving,” International Conference on E-Business and Information System Security, p p. 1-4, 2009.
  16. Xuyun Zhang, Chang Liu, Surya Nepal, Jinjun Chen,"An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud, “Journal of Computer and System Sciences, 2013.

Keywords

Privacy, piracy, k- anonymity algorithm, watermarking