Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Achieving k-Anonymity Privacy Protection using Agents

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 90 - Number 15
Year of Publication: 2014
Authors:
Dhanashree Nanasaheb Kharde
Aardra Menon
Sharath Kumar J
10.5120/15797-4499

Dhanashree Nanasaheb Kharde, Aardra Menon and Sharath Kumar J. Article: Achieving k-Anonymity Privacy Protection using Agents. International Journal of Computer Applications 90(15):25-30, March 2014. Full text available. BibTeX

@article{key:article,
	author = {Dhanashree Nanasaheb Kharde and Aardra Menon and Sharath Kumar J},
	title = {Article: Achieving k-Anonymity Privacy Protection using Agents},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {90},
	number = {15},
	pages = {25-30},
	month = {March},
	note = {Full text available}
}

Abstract

Nowadays, in given network or system we have to share personal specific data. If unauthorized person read our personal data then it is simple break the privacy policy . and any one can read other personal data and its easy to figure out the particular person so indirectly violation in confidentiality also involves . so this paper on the achieving k-anonymity privacy protection using agents. where k-anonymity means given data is more general form so that the identification of particular user not so far easy. Agent technology is newly introduced with existing system. Different agents are used for different task like mining agent, data agent, task agent, user agent etc. and they are communicate with each other and work together. Its provide heuristic solution. The proposed system having several important properties so it can overcome drawback of existing system . like secure computation, confidentiality access, fast access, privacy preservation provide.

References

  • Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), 2002; 571-588.
  • EMADS: An ExtendibleMulti-Agent Data Miner Kamal Ali Albashiri, Frans Coenen, and Paul Leng Department Of Computer Science, The University of Liverpool,Ashton Building , Ashto Street, Liverpool L69 3BX, United Kingdom.
  • User-side Personalization Considering Privacy Preserving in Cloud Systems Leila Sharifi Maryam Heidari Beisafar Department of Computer Engineering & Information Technology. 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
  • Development multiagent system with jade Nikolaos Spanoudakis, Pavlos Moraitis Published in In: Applied Artificial Intelligence Journal, Taylor & Francis, Vol. 20, No. 24, February-April 2006, pp. 251-273.
  • A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment . IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, January 2012 ISSN(Online):1694-0814.
  • Web Service Based Model for Inter-agent Communication In Multi-Agent Systems: A Case Study,International Journal of Computer Information Systems and Industrial Management Applications. ISSN 2150-7988 Volume 5 (2013) pp. 642-651.
  • Cryptographic techniques for privacy preserving Data mining Agent Based Network Sniffer Detection, International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013 ISSN 2250-3153.