Privacy Preservation of Mobile Data using Matrix Transformation

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Location Data Privacy Preservation in Mobile Networks

Uncontrolled variety of location based service (LBS) applications in mobile networks led to the loss of individual user location data privacy. To preserve privacy in mobile networks data randomization and anonymization must be used because of location data uncertainty. By data randomization additional random data is added to the original location data, desensitizing the precise information cont...

متن کامل

A Survey: Privacy Preservation Data Mining Techniques and Geometric Transformation

What is Privacy Preserving Data Mining is the process of hiding and protecting sensitive data of individuals. In the recent era, we use many applications which require personal sensitive data of individuals. Thus, people are more concern about sharing their personal sensitive information due to increase of privacy intrusions. Since last two decades many Privacy Preserving Data Mining techniques...

متن کامل

Modelling Extraction Transformation Load embedding Privacy Preservation using UML

Extraction Transformation Load plays an important phase in development of data warehouse due its complexity of selecting data from different location and having different structures. The recent industry of data warehouse is driven by Privacy Preserving Data Mining which ensures privacy of sensitive information during Mining and is a requirement of most Data Bases. Current approaches to modellin...

متن کامل

Privacy Preservation through Data Generation

Many databases will or can not be disclosed without strong guarantees that no sensitive information can be extracted. To address this concern several data perturbation techniques have been proposed. However, it has been shown that either sensitive information can still be extracted from the perturbed data with little prior knowledge, or that many patterns are lost. In this paper we show that ge...

متن کامل

Privacy Preservation over Untrusted Mobile Networks

The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile network operators. These operators are typically assumed to be trusted and to manage the information they collect in a privacy-preserving way. Such information, however, is extremely sensitive and coveted by many companies...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2014

ISSN: 0975-8887

DOI: 10.5120/15274-3865