狠狠撸

狠狠撸Share a Scribd company logo
Statement Of Purpose 
1) A New Approach for Privacy Preserving Data Publishing 
By: Chirag Ramesh Desai (ME COMPS) 
1) INTRODUCTION :- 
Privacy preservation in publishing of micro data has been studied 
extensively in recent years. Micro data contain records each of which contains 
information about an individual entity, such as a person, a household, or an 
organization. Several anonymization techniques, such as generalization, 
bucketization and slicing have been designed for privacy preserving micro data 
publishing. 
2) Objective Of Project :- 
To overcome drawback of anonymization techniques .And to enhance the 
either of the anonymization techniques like generalization, bucketization and 
slicing for preserving the privacy in data publishing . 
3) Motivation :- 
Slicing model partitions the data set both vertically and horizontally. The 
basic idea of slicing is to break the association cross columns, but to preserve the 
association within each column. This reduces the dimensionality of the data and 
preserves better utility than generalization and Bucketization. Slicing protects 
privacy because it breaks the associations between uncorrelated attributes, which 
are Infrequent . 
Slicing has the drawback that when more number of similar attribute value 
and the sensitive value are present, different tuples may give the original tuple 
while performing the random permutation. The utility of the dataset is also lost by 
generating the fake tuples. 
Thus enhanced slicing model has to be design to overcome the drawbacks of 
slicing. 
SOP-1 Page 1
Statement Of Purpose 
1) A New Approach for Privacy Preserving Data Publishing 
By: Chirag Ramesh Desai (ME COMPS) 
4) Limitation Of Existing System :- 
? Generalization has the drawback that it loses considerable amount of 
information, especially for high dimensional data. 
? Bucketization has the drawback that it does not prevent membership 
disclosure and does not apply for data that do not have a clear 
separation between quasi-identifying attributes and sensitive 
attributes. 
? Slicing has the drawback that when more number of similar attribute 
value and the sensitive value may present, different tuples may give 
the original tuple while performing the random permutation. The 
utility of the dataset is also lost by generating the fake tuples. 
5) Proposed novel improvement or techniques :- 
To design or implement enhanced slicing model for preserving privacy in 
data publication by using Suppression slicing and/or Mondrian slicing. 
6) Intended Methodology :- 
The Suppression slicing will suppress any one of the attribute value in the 
tuples and then perform the slicing. In Mondrian slicing random permutation is 
done with all the buckets not within the single bucket. 
7) Project scope :- 
To overcome drawback of slicing technique is the main scope. The 
suppression slicing will help to maintain utility with minimum loss by suppressing 
only very few values and privacy is maintained by random permutation. In 
Mondrian slicing random permutation is done that will help to maintain same 
utility of the original dataset is maintained. 
SOP-1 Page 2
Ad

Recommended

DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
IEEEGLOBALSOFTTECHNOLOGIES
?
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
acijjournal
?
Proximity aware local-recoding anonymization with map reduce for scalable big...
Proximity aware local-recoding anonymization with map reduce for scalable big...
Nexgen Technology
?
Secure third party cloud computing services a proposal by shibwabo anyembe
Secure third party cloud computing services a proposal by shibwabo anyembe
Shibwabo Christopher Anyembe
?
Br36413417
Br36413417
IJERA Editor
?
Rfid based road toll tax
Rfid based road toll tax
angel300692
?
A Rule based Slicing Approach to Achieve Data Publishing and Privacy
A Rule based Slicing Approach to Achieve Data Publishing and Privacy
ijsrd.com
?
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
?
Sensitive label privacy protection on social
Sensitive label privacy protection on social
IEEEFINALYEARPROJECTS
?
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
ijujournal
?
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
ijujournal
?
A review on privacy preservation in data mining
A review on privacy preservation in data mining
ijujournal
?
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
ijujournal
?
Data masking techniques for Insurance
Data masking techniques for Insurance
NIIT Technologies
?
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
?
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
IEEEGLOBALSOFTTECHNOLOGIES
?
Privacy preservation techniques in data mining
Privacy preservation techniques in data mining
eSAT Publishing House
?
Privacy preservation techniques in data mining
Privacy preservation techniques in data mining
eSAT Journals
?
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
cscpconf
?
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
?
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...
JPINFOTECH JAYAPRAKASH
?
Final review m score
Final review m score
azhar4010
?
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
?
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
?
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
csandit
?
Distributed Data mining using Multi Agent data
Distributed Data mining using Multi Agent data
IRJET Journal
?
The Survey of Data Mining Applications And Feature Scope
The Survey of Data Mining Applications And Feature Scope
IJCSEIT Journal
?
Unveiling Patterns.pdf
Unveiling Patterns.pdf
Kajal Digital
?
MRI Pulse Sequence in radiology physics.pptx
MRI Pulse Sequence in radiology physics.pptx
BelaynehBishaw
?
REGRESSION DIAGNOSTIC I: MULTICOLLINEARITY
REGRESSION DIAGNOSTIC I: MULTICOLLINEARITY
Ameya Patekar
?

More Related Content

Similar to Sop slicing (20)

Sensitive label privacy protection on social
Sensitive label privacy protection on social
IEEEFINALYEARPROJECTS
?
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
ijujournal
?
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
ijujournal
?
A review on privacy preservation in data mining
A review on privacy preservation in data mining
ijujournal
?
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
ijujournal
?
Data masking techniques for Insurance
Data masking techniques for Insurance
NIIT Technologies
?
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
?
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
IEEEGLOBALSOFTTECHNOLOGIES
?
Privacy preservation techniques in data mining
Privacy preservation techniques in data mining
eSAT Publishing House
?
Privacy preservation techniques in data mining
Privacy preservation techniques in data mining
eSAT Journals
?
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
cscpconf
?
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
?
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...
JPINFOTECH JAYAPRAKASH
?
Final review m score
Final review m score
azhar4010
?
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
?
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
?
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
csandit
?
Distributed Data mining using Multi Agent data
Distributed Data mining using Multi Agent data
IRJET Journal
?
The Survey of Data Mining Applications And Feature Scope
The Survey of Data Mining Applications And Feature Scope
IJCSEIT Journal
?
Unveiling Patterns.pdf
Unveiling Patterns.pdf
Kajal Digital
?
Sensitive label privacy protection on social
Sensitive label privacy protection on social
IEEEFINALYEARPROJECTS
?
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
ijujournal
?
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
ijujournal
?
A review on privacy preservation in data mining
A review on privacy preservation in data mining
ijujournal
?
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
ijujournal
?
Data masking techniques for Insurance
Data masking techniques for Insurance
NIIT Technologies
?
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
?
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
IEEEGLOBALSOFTTECHNOLOGIES
?
Privacy preservation techniques in data mining
Privacy preservation techniques in data mining
eSAT Publishing House
?
Privacy preservation techniques in data mining
Privacy preservation techniques in data mining
eSAT Journals
?
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
cscpconf
?
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
?
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...
JPINFOTECH JAYAPRAKASH
?
Final review m score
Final review m score
azhar4010
?
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
?
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
?
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
csandit
?
Distributed Data mining using Multi Agent data
Distributed Data mining using Multi Agent data
IRJET Journal
?
The Survey of Data Mining Applications And Feature Scope
The Survey of Data Mining Applications And Feature Scope
IJCSEIT Journal
?

Recently uploaded (20)

MRI Pulse Sequence in radiology physics.pptx
MRI Pulse Sequence in radiology physics.pptx
BelaynehBishaw
?
REGRESSION DIAGNOSTIC I: MULTICOLLINEARITY
REGRESSION DIAGNOSTIC I: MULTICOLLINEARITY
Ameya Patekar
?
QUALITATIVE EXPLANATORY VARIABLES REGRESSION MODELS
QUALITATIVE EXPLANATORY VARIABLES REGRESSION MODELS
Ameya Patekar
?
Grote OSM datasets zonder kopzorgen bij Reijers
Grote OSM datasets zonder kopzorgen bij Reijers
jacoba18
?
Power BI API Connectors - Best Practices for Scalable Data Connections
Power BI API Connectors - Best Practices for Scalable Data Connections
Vidicorp Ltd
?
Pause Travail 22 Hostiou Girard 12 juin 2025.pdf
Pause Travail 22 Hostiou Girard 12 juin 2025.pdf
Institut de l'Elevage - Idele
?
presentation4.pdf Intro to mcmc methodss
presentation4.pdf Intro to mcmc methodss
SergeyTsygankov6
?
LECTURE_skakkakwowowkwkkwkskwkqowoowoaoaoa.cooos
LECTURE_skakkakwowowkwkkwkskwkqowoowoaoaoa.cooos
ssuseraf13da
?
NASA ESE Study Results v4 05.29.2020.pptx
NASA ESE Study Results v4 05.29.2020.pptx
CiroAlejandroCamacho
?
Addressing-the-Air-Quality-Crisis-in-New-Delhi.pptx
Addressing-the-Air-Quality-Crisis-in-New-Delhi.pptx
manpreetkaur3469
?
Shifting Focus on AI: How it Can Make a Positive Difference
Shifting Focus on AI: How it Can Make a Positive Difference
1508 A/S
?
Measurecamp Copenhagen - Consent Context
Measurecamp Copenhagen - Consent Context
Human37
?
Advanced_English_Pronunciation_in_Use.pdf
Advanced_English_Pronunciation_in_Use.pdf
leogoemmanguyenthao
?
BCG-Executive-Perspectives-CEOs-Guide-to-Maximizing-Value-from-AI-EP0-3July20...
BCG-Executive-Perspectives-CEOs-Guide-to-Maximizing-Value-from-AI-EP0-3July20...
benediktnetzer1
?
Data-Driven-Operational--Excellence.pptx
Data-Driven-Operational--Excellence.pptx
NiwanthaThilanjanaGa
?
REGRESSION DIAGNOSTIC II: HETEROSCEDASTICITY
REGRESSION DIAGNOSTIC II: HETEROSCEDASTICITY
Ameya Patekar
?
llm_presentation and deep learning methods
llm_presentation and deep learning methods
sayedabdussalam11
?
Data Visualisation in data science for students
Data Visualisation in data science for students
confidenceascend
?
定制翱颁础顿学生卡加拿大安大略艺术与设计大学成绩单范本,翱颁础顿成绩单复刻
定制翱颁础顿学生卡加拿大安大略艺术与设计大学成绩单范本,翱颁础顿成绩单复刻
taqyed
?
MCB Internship report for the year of 2025
MCB Internship report for the year of 2025
PakistanPrinting
?
MRI Pulse Sequence in radiology physics.pptx
MRI Pulse Sequence in radiology physics.pptx
BelaynehBishaw
?
REGRESSION DIAGNOSTIC I: MULTICOLLINEARITY
REGRESSION DIAGNOSTIC I: MULTICOLLINEARITY
Ameya Patekar
?
QUALITATIVE EXPLANATORY VARIABLES REGRESSION MODELS
QUALITATIVE EXPLANATORY VARIABLES REGRESSION MODELS
Ameya Patekar
?
Grote OSM datasets zonder kopzorgen bij Reijers
Grote OSM datasets zonder kopzorgen bij Reijers
jacoba18
?
Power BI API Connectors - Best Practices for Scalable Data Connections
Power BI API Connectors - Best Practices for Scalable Data Connections
Vidicorp Ltd
?
presentation4.pdf Intro to mcmc methodss
presentation4.pdf Intro to mcmc methodss
SergeyTsygankov6
?
LECTURE_skakkakwowowkwkkwkskwkqowoowoaoaoa.cooos
LECTURE_skakkakwowowkwkkwkskwkqowoowoaoaoa.cooos
ssuseraf13da
?
NASA ESE Study Results v4 05.29.2020.pptx
NASA ESE Study Results v4 05.29.2020.pptx
CiroAlejandroCamacho
?
Addressing-the-Air-Quality-Crisis-in-New-Delhi.pptx
Addressing-the-Air-Quality-Crisis-in-New-Delhi.pptx
manpreetkaur3469
?
Shifting Focus on AI: How it Can Make a Positive Difference
Shifting Focus on AI: How it Can Make a Positive Difference
1508 A/S
?
Measurecamp Copenhagen - Consent Context
Measurecamp Copenhagen - Consent Context
Human37
?
Advanced_English_Pronunciation_in_Use.pdf
Advanced_English_Pronunciation_in_Use.pdf
leogoemmanguyenthao
?
BCG-Executive-Perspectives-CEOs-Guide-to-Maximizing-Value-from-AI-EP0-3July20...
BCG-Executive-Perspectives-CEOs-Guide-to-Maximizing-Value-from-AI-EP0-3July20...
benediktnetzer1
?
Data-Driven-Operational--Excellence.pptx
Data-Driven-Operational--Excellence.pptx
NiwanthaThilanjanaGa
?
REGRESSION DIAGNOSTIC II: HETEROSCEDASTICITY
REGRESSION DIAGNOSTIC II: HETEROSCEDASTICITY
Ameya Patekar
?
llm_presentation and deep learning methods
llm_presentation and deep learning methods
sayedabdussalam11
?
Data Visualisation in data science for students
Data Visualisation in data science for students
confidenceascend
?
定制翱颁础顿学生卡加拿大安大略艺术与设计大学成绩单范本,翱颁础顿成绩单复刻
定制翱颁础顿学生卡加拿大安大略艺术与设计大学成绩单范本,翱颁础顿成绩单复刻
taqyed
?
MCB Internship report for the year of 2025
MCB Internship report for the year of 2025
PakistanPrinting
?
Ad

Sop slicing

  • 1. Statement Of Purpose 1) A New Approach for Privacy Preserving Data Publishing By: Chirag Ramesh Desai (ME COMPS) 1) INTRODUCTION :- Privacy preservation in publishing of micro data has been studied extensively in recent years. Micro data contain records each of which contains information about an individual entity, such as a person, a household, or an organization. Several anonymization techniques, such as generalization, bucketization and slicing have been designed for privacy preserving micro data publishing. 2) Objective Of Project :- To overcome drawback of anonymization techniques .And to enhance the either of the anonymization techniques like generalization, bucketization and slicing for preserving the privacy in data publishing . 3) Motivation :- Slicing model partitions the data set both vertically and horizontally. The basic idea of slicing is to break the association cross columns, but to preserve the association within each column. This reduces the dimensionality of the data and preserves better utility than generalization and Bucketization. Slicing protects privacy because it breaks the associations between uncorrelated attributes, which are Infrequent . Slicing has the drawback that when more number of similar attribute value and the sensitive value are present, different tuples may give the original tuple while performing the random permutation. The utility of the dataset is also lost by generating the fake tuples. Thus enhanced slicing model has to be design to overcome the drawbacks of slicing. SOP-1 Page 1
  • 2. Statement Of Purpose 1) A New Approach for Privacy Preserving Data Publishing By: Chirag Ramesh Desai (ME COMPS) 4) Limitation Of Existing System :- ? Generalization has the drawback that it loses considerable amount of information, especially for high dimensional data. ? Bucketization has the drawback that it does not prevent membership disclosure and does not apply for data that do not have a clear separation between quasi-identifying attributes and sensitive attributes. ? Slicing has the drawback that when more number of similar attribute value and the sensitive value may present, different tuples may give the original tuple while performing the random permutation. The utility of the dataset is also lost by generating the fake tuples. 5) Proposed novel improvement or techniques :- To design or implement enhanced slicing model for preserving privacy in data publication by using Suppression slicing and/or Mondrian slicing. 6) Intended Methodology :- The Suppression slicing will suppress any one of the attribute value in the tuples and then perform the slicing. In Mondrian slicing random permutation is done with all the buckets not within the single bucket. 7) Project scope :- To overcome drawback of slicing technique is the main scope. The suppression slicing will help to maintain utility with minimum loss by suppressing only very few values and privacy is maintained by random permutation. In Mondrian slicing random permutation is done that will help to maintain same utility of the original dataset is maintained. SOP-1 Page 2