CFP last date
20 December 2024
Reseach Article

Achieving k-Anonymity Privacy Protection using Agents

by Dhanashree Nanasaheb Kharde, Aardra Menon, Sharath Kumar J
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 15
Year of Publication: 2014
Authors: Dhanashree Nanasaheb Kharde, Aardra Menon, Sharath Kumar J
10.5120/15797-4499

Dhanashree Nanasaheb Kharde, Aardra Menon, Sharath Kumar J . Achieving k-Anonymity Privacy Protection using Agents. International Journal of Computer Applications. 90, 15 ( March 2014), 25-30. DOI=10.5120/15797-4499

@article{ 10.5120/15797-4499,
author = { Dhanashree Nanasaheb Kharde, Aardra Menon, Sharath Kumar J },
title = { Achieving k-Anonymity Privacy Protection using Agents },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 15 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 25-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number15/15797-4499/ },
doi = { 10.5120/15797-4499 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:11:07.904468+05:30
%A Dhanashree Nanasaheb Kharde
%A Aardra Menon
%A Sharath Kumar J
%T Achieving k-Anonymity Privacy Protection using Agents
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 15
%P 25-30
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays, in given network or system we have to share personal specific data. If unauthorized person read our personal data then it is simple break the privacy policy . and any one can read other personal data and its easy to figure out the particular person so indirectly violation in confidentiality also involves . so this paper on the achieving k-anonymity privacy protection using agents. where k-anonymity means given data is more general form so that the identification of particular user not so far easy. Agent technology is newly introduced with existing system. Different agents are used for different task like mining agent, data agent, task agent, user agent etc. and they are communicate with each other and work together. Its provide heuristic solution. The proposed system having several important properties so it can overcome drawback of existing system . like secure computation, confidentiality access, fast access, privacy preservation provide.

References
  1. Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), 2002; 571-588.
  2. EMADS: An ExtendibleMulti-Agent Data Miner Kamal Ali Albashiri, Frans Coenen, and Paul Leng Department Of Computer Science, The University of Liverpool,Ashton Building , Ashto Street, Liverpool L69 3BX, United Kingdom.
  3. User-side Personalization Considering Privacy Preserving in Cloud Systems Leila Sharifi Maryam Heidari Beisafar Department of Computer Engineering & Information Technology. 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
  4. Development multiagent system with jade Nikolaos Spanoudakis, Pavlos Moraitis Published in In: Applied Artificial Intelligence Journal, Taylor & Francis, Vol. 20, No. 24, February-April 2006, pp. 251-273.
  5. A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment . IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, January 2012 ISSN(Online):1694-0814.
  6. Web Service Based Model for Inter-agent Communication In Multi-Agent Systems: A Case Study,International Journal of Computer Information Systems and Industrial Management Applications. ISSN 2150-7988 Volume 5 (2013) pp. 642-651.
  7. Cryptographic techniques for privacy preserving Data mining Agent Based Network Sniffer Detection, International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013 ISSN 2250-3153.
Index Terms

Computer Science
Information Sciences

Keywords

Data anonymity Intelligent agents Data privacy confidentiality Re-identification