Online ISSN: 2515-8260

Keywords : privacy

Sensitive Label Security Preservation with Anatomization for Data Publishing

Subapriya V; Jaichandran R; Shunmuganathan K.L; Puja Kumari; Anjali Kumari; Shivani P

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 2992-2998

Maintaining privacy in data publishing is a major challenge. In complex world sensitive information privacy is the main issue. Many algorithms are used to protect sensitive information in mined data which is not efficient because resulted output can be easily linked with public data so it shows user identity. Many techniques are used to protect privacy in data mining. Anatomization approaches aim to avoid directly use of sensitive data. The growing popularity and development of anatomization technologies bring sensitive data and protect the security of sensitive information Anatomization. The anatomization approach dissociates the correlation observed between the quasi identifier attributes and sensitive attributes and yields two separate tables with non-overlapping attributes. In the slicing algorithm, vertical partitioning does the grouping of the correlated sensitive attributes in sensitive table together and thereby minimizes the dimensionality. Consequently, it becomes increasingly important to preserve the privacy of published data. An attacker is apt to identify an individual from the published tables, with attacks through the record linkage, attribute linkage, table linkage or probabilistic attack. Two comprehensive sets of real-world relationship data are applied to evaluate the performance of our anonymization approach. Simulations and privacy analysis show our scheme possesses better privacy while ensuring higher utility.

Efficient Security Measures to Avoid Data Vul-nerabilities in Cloud Using Encryption Tech-niques

Nomula Manoj Kumar Reddy; S Divya

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 3, Pages 1571-1581

Thetechnology of engineering science is growingfaster and its usage isto bootincreasing speedily. The data and its usage has become an important issue in existence. There by the storage of data may be a crucial issue in means of life. For this data storage, Cloud Computing is useful. Cloud computing is that the follow of using a network of remote servers hosted on internet to store, manage and methodology data on demand and pay as per use. It provides access to a pool of shared resources instead of native servers or personal computers. as a result, outfit do not acquire the things physically, it saves managing value and time for organizations. As a result of the sector of cloud computing is spreading the new techniques are developing. This increase in cloud computing setting to boot can increase security challenges for cloud developers. Most of the organizations are an excellent deal concerned regarding the possession of their data.This analysis paper presents a review on the cloud computing concepts yet as security issues inherent at intervals the context of cloud computing and cloud infrastructure. This paper in addition analyses the key analysis and challenges that presents in cloud computing and offers best practices to service suppliers yet as enterprises. The foremost goal is to review different types of attacks and encryption techniques to secure the cloudmodel.