CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Hierarchical Model for Preserving Privacy in Vertically Partitioned Distributed Databases

by Rayudu Srinivas, A. Sri Rama Chandra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 71 - Number 3
Year of Publication: 2013
Authors: Rayudu Srinivas, A. Sri Rama Chandra
10.5120/12341-8618

Rayudu Srinivas, A. Sri Rama Chandra . Hierarchical Model for Preserving Privacy in Vertically Partitioned Distributed Databases. International Journal of Computer Applications. 71, 3 ( June 2013), 37-39. DOI=10.5120/12341-8618

@article{ 10.5120/12341-8618,
author = { Rayudu Srinivas, A. Sri Rama Chandra },
title = { Hierarchical Model for Preserving Privacy in Vertically Partitioned Distributed Databases },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 71 },
number = { 3 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 37-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume71/number3/12341-8618/ },
doi = { 10.5120/12341-8618 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:34:33.871012+05:30
%A Rayudu Srinivas
%A A. Sri Rama Chandra
%T Hierarchical Model for Preserving Privacy in Vertically Partitioned Distributed Databases
%J International Journal of Computer Applications
%@ 0975-8887
%V 71
%N 3
%P 37-39
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data sharing is an important task in the world of globalization. Organizations, government offices and hospitals release data to the public for the purpose of analysis and research. While publishing data to public, privacy is to be provided to the sensitive information. Privacy preservation aims at limiting the risk of leaking published data to a particular individual. To provide privacy copious privacy techniques are available, sophisticated privacy preserving techniques are required for distributed data. In distributed databases the data is distributed over the nodes. The data distribution may be horizontally partitioned or vertically partitioned. To provide privacy to the horizontally partitioned data various techniques proposed in [7,8] and for vertically partitioned data the method proposed in [15] if the data stored at two sites. Here we are proposed a novel method to provide privacy to the data if the data is vertically partitioned and distributed over sites. The major advantage of proposed method is to reduce transmission load and to provide privacy using multidimensional distributed method that is similar to the most popular method Mondrian multidimensional k-anonymity[5].

References
  1. Latanya Sweeney: " K- anonymity : A model for protecting privacy" IJUFKS 10(5) :2002; 557-570
  2. K. LeFevre, D. J. DeWitt, and R. Rama Krishna. "Incognito: Efficient full domain k-anonymity. In SIGMOD conference, pages 49-60,2005.
  3. R. J. Bayardo and R. Agrawal. " Data privacy through optimal k-anonymity", In Proc. 21st Intnl. Conf. Data Engg(ICDE),pages217-228,USA,2005.
  4. Ashwin Machanavajjhala , Johannes Gehrke, Daniel Kifer : "l- diversity: Privacy beyond k-anonymity" In Proc. 22nd Intnl. Conf. Data Engg. (ICDE),pages 24,2006
  5. Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan: "Mondrian multidimensional k-anonymity" In ICDE, page 25,2006.
  6. Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian:" t closeness : privacy Beyond k-anonymity and l-diversity" ,In ICDE, pages106-115,2007
  7. Pawel Jurczyk,Li Xiong : "Privacy preserving data publishing for horizontally partitioned databases" Technical Report TR-2008-013,EmoryUniversity,Math&CSDept,2008.
  8. R. Srinivas et al. , Hierarchical Model for Preserving Privacy in Horizontally Partitioned Databases" IJETTCSVolume2 Issue1 jan-feb-2013
  9. Guan, Yong, Xinwen Fu, and Riccardo Bettati, "An Optimal Strategy for Anonymous Communication Protocols," Proceedings of the 22nd International Conference on Distributed Computing Systems, College Station, TX, 2002.
  10. Pawel Jurczyk,Li Xiong . "DObjects : enabling distributed data services for meta computing platform" In proc. Of the ICCS, 2008.
  11. Wongil choi, Joonsuk ryu, Won young kim, Ungmo kim . "Simple data transformation method for privacy preserving data republication" IEEE 2009 : 978-1-4244-428-7109.
  12. Ren Xiangmin, Yang Jinf, Zhang Jianpei, Wang Kecho: " Research on CBK(L,K)- anonymity algorithm" IJACT volume 3: number-4 may 2011.
  13. R. Srinivas et al. ,. "Preserving Privacy in Horizontally Partitioned Databases Using Hierarchical Model" IOSR Journal of Engineering May. 2012, Vol. 2(5) pp: 1091-1094
  14. R. Srinivas et al. ,. "Effective Bandwidth Utilization using Trusted LPEs in Anonymous Communication" International Journal of Computer Applications (0975 – 888) Volume 47– No. 7, June 2012
  15. Wei jian and Chris Clifton, Dept of CS, Purdu university" Privacy Preserving Distributed K-anonymity" CERIAS Tech Report:2005-13
Index Terms

Computer Science
Information Sciences

Keywords

Distributed data vertically partitioned data Privacy anonymous communication Mix Hierarchical Model PPDM anonymity