Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Soft computing and intelligent systems: Tools, techniques and applications
Guest editors: Sabu M. Thampi and El-Sayed M. El-Alfy
Article type: Research Article
Authors: Sreedhar, K.C.a | Faruk, M.N.b; * | Venkateswarlu, B.c
Affiliations: [a] Department of Computer Science and Engineering, Srinidhi Institute of Science and Technology, Hyderabad, India | [b] Department of Computer Science and Engineering, QIS College of Engineering and Technology, Ongole, India | [c] Department of Computer Science and Engineering, VIT University, Vellore, India
Correspondence: [*] Corresponding author. Dr. M.N. Faruk, Department of Computer Science and Engineering, QIS College of Engineering and Technology, Ongole, Andhra Pradesh, India. Mobile: +91 9943220111; Tel.: +91 8592 284524; Fax: +91 8592 281023; E-mail: [email protected].
Abstract: Cloud computing plays a predominant role in storage technologies. It enables the tenant user to deploy their infrastructure without any investment. Cloud storage offers flexibility with storage and sharing facilities using the Internet platform. Storing sensitive information such as clinical data requires high privacy preservation and is associated with serious concern over data privacy on the cloud platform. Privacy preservation becomes the most adherent issue when a large volume of data is stored in public clouds. Subtree anonymization using the bottom–up generalization (BUG) and top–down specialization (TDS) approaches has been widely adopted for anonymizing data sets. This ensures individual data privacy; however, it causes potential violations when the new update is received, and it suffers from valuing the k-anonymity parameter. In this proposed model, a pseudo-identity was anticipated to accomplish privacy preservation with maximum data utility on incremental data sets. Initially, the Data Set (DS) was partitioned in the preprocessing stage; subsequently, the processed data sets were clustered into groups. The genetic model was used for indexing and updating incremental data sets. This was consistent with repeatedly modified data sets. In the evaluation process, an incremental and distributed DS was deployed, and our model exhibited efficient and optimal performance for privacy preservation in comparison with existing models.
Keywords: Subtree anonymization, bottom–up generalization, top–down specialization, k-anonymity, data set partitioning
DOI: 10.3233/JIFS-169229
Journal: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 4, pp. 2863-2873, 2017
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]