Título: AN EFFECTIVE STRATEGY OF THE DATA PUBLISHING
Autores: Yamuna, A.; M.Tech Student, Dept of CSE, Sridevi Women’s Engineering College, Hyderabad, A.P
Srinivas, Ch.; Assistant Professor, Dept of CSE, Sridevi Women’s Engineering College, Hyderabad, A.P
Fecha: 2013-08-07
Publicador: International journal of computer and electronics research
Fuente:
Tipo: Peer-reviewed Article
Tema: Data encryption; Data authentication; Digitalization; privacy preservation; Security analysis respectively
Descripción: There is a lot of advancement take place in the system in a well anonymous fashion with respect to the replica of the user based strategy in a well efficient manner respectively. With these advancement in the system based strategy there is a lot of the requirement from the user based aspect in which there is a huge implementation of the strategy which is well satisfied by the user in a well oriented aspect respectively. Here there is an implementation of the bucketization based strategy and followed by the generalization based aspect in a well oriented fashion and lot more techniques for the effective implementation of the system in a well respective fashion. Here these are techniques are previously designed by the many of the research oriented strategy takes place in the system as on behalf f the security as a major role in its implementation strategy which plays a major role on behalf of the security as a prior factor related to the privacy control oriented strategy as a well effective fashion respectively. There is a lot of analysis takes place in the system with respect to the implementation of the research oriented phenomena in a well effective fashion where by the application of the technique related to the generalization based strategy in which it unable to give the complete protection based aspect followed by the data loss in the system takes place in a well oriented fashion respectively. Here on the other side oriented aspect I which there is a technique by the term of the bucketization based phenomena in a well effective manner where there is less effective in its scenario in which there is partitioning of the data but it is not satisfactory level respectively. Therefore there is a huge necessity of the implementation of the system which overcome the problems of the previous methods as defined above in the well integrated fashion as the generalization followed by the bucketization as a major strategy where there is an effective partitioning of the data takes place in the system followed by the minute separation takes place in a well efficient manner respectively followed by the security as a primary aspect in which data authentication as its aspect. Therefore the new technique is implemented by the help of the strategy of the slicing based phenomena which plays a major role for the accurate partitioning followed by the efficient analysis with respect to the security oriented strategy in a well respective fashion. Experiments have been conducted on the present method and a number of the accurate analysis is made in a well effective fashion where there is an improvement in the performance based strategy followed by the entire system based outcome in a well oriented fashion respectively.  
Idioma: Inglés

Artículos similares:

A hybrid k-Mean-GRASP for partition based Clustering of two-dimensional data space as an application of p-median problem por Nadella, Sunil; Associate Professor,P.G. Dept of Computer Science, Ideal College of Arts & Sciences, Kakinada,M V S V, Kiranmai; Lecturer ,Department of CSE,University College of Engineering,JNTU Kakinada,Gugulotu, Narasimha; Department of CSE JNTUH College of Engineering, Nachupally, Kondagattu,Karimnagar
Architecture of Mobile application, Security issues and Services involved in Mobile Cloud Computing Environment por Saini, Swarnpreet SIngh; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar,Bagga, Ritu; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar,Singh, Devinder; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar,Jangwal, Tarun; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar
A Novel approach of Hybrid Method of Hiding the Text Information Using Stegnography por R, Thamaraiselvan; Assistant Professor Dept. of Computer Applications M.G.R.College Dr. MGR Nagar Hosur - 635109 TN, India,Saradha, A.; Professor and Head, Department of Computer Science and Engineering, Institute of Road and Transport Technology, Erode, TN, India
RSA Algorithm Implementation for Ciphering Medical Imaging por Ali, Samoud; Signal processing Laboratory - Science Faculty of Tunis , 1060 Tunis.,Adnen, Cherif; Signal processing Laboratory - Science Faculty of Tunis , 1060 Tunis.
A STUDY ON KNOWLEDGE ACQUISITION APPROACH FOR COMPOSITE AEROSPACE COMPONENT DESIGN por Sivaraman, G; Assistant Professor & HeadDept. of Computer ApplicationsM.G.R.CollegeDr. MGR NagarHosur - 635109TN
Corpus based Emotion Extraction to implement prosody feature in Speech Synthesis Systems por Chandak, Manoj B; DEPTT. OF COMPUTER SCIENCE AND ENGG S.R.K.N.E.C NAGPUR UNIVERSITY,Bhutekar, Swati
A NEW DATA HIDING METHOD USING PIXEL POSITION AND LOGICAL AND OPERATION por Saini, Ravi; C.M.R.A., GP Sanghi,Rohtak, Haryana,Yadav, Rajkumar; U.I.E.T, Maharshi Dayanand University, Rohtak
A New Focus on Distance Learning for Physically Impaired Students: A Multi-agent Oriented Approach por Pujari, Shiladitya; University Institute of Technology, Burdwan University,Mondal, Subrata
Productivity Inference with Dynamic Bayesian Models in Software Development Projects por Naman, Abou Bakar; Department of Comptuer Science & Information Technology Sarhad University,Lali, M.Ikram.; University of education Lahore, Attock campus
10