Privacy Preservation of Mobile Data using Matrix Transformation
نویسندگان
چکیده
منابع مشابه
Location Data Privacy Preservation in Mobile Networks
Uncontrolled variety of location based service (LBS) applications in mobile networks led to the loss of individual user location data privacy. To preserve privacy in mobile networks data randomization and anonymization must be used because of location data uncertainty. By data randomization additional random data is added to the original location data, desensitizing the precise information cont...
متن کاملA Survey: Privacy Preservation Data Mining Techniques and Geometric Transformation
What is Privacy Preserving Data Mining is the process of hiding and protecting sensitive data of individuals. In the recent era, we use many applications which require personal sensitive data of individuals. Thus, people are more concern about sharing their personal sensitive information due to increase of privacy intrusions. Since last two decades many Privacy Preserving Data Mining techniques...
متن کاملModelling Extraction Transformation Load embedding Privacy Preservation using UML
Extraction Transformation Load plays an important phase in development of data warehouse due its complexity of selecting data from different location and having different structures. The recent industry of data warehouse is driven by Privacy Preserving Data Mining which ensures privacy of sensitive information during Mining and is a requirement of most Data Bases. Current approaches to modellin...
متن کاملPrivacy Preservation through Data Generation
Many databases will or can not be disclosed without strong guarantees that no sensitive information can be extracted. To address this concern several data perturbation techniques have been proposed. However, it has been shown that either sensitive information can still be extracted from the perturbed data with little prior knowledge, or that many patterns are lost. In this paper we show that ge...
متن کاملPrivacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile network operators. These operators are typically assumed to be trusted and to manage the information they collect in a privacy-preserving way. Such information, however, is extremely sensitive and coveted by many companies...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2014
ISSN: 0975-8887
DOI: 10.5120/15274-3865