SlideShare ist ein Scribd-Unternehmen logo
1 von 15
www.lemenizinfotech.com
LeMeniz Infotech
LeMeniz Infotech 
LeMeniz Infotech a Leading Software Concern in Pondicherry Stepping in IEEE Projects 2014- 
2015. We are Proud to Presents Android App for IEEE Projects Titles 2014-2015. 
Download From : www.ieeeprojectspondicherrry.weebly.com 
Student Benefits: 
=>No False Commitment 
=>Real Time Implementation 
->27 X 7 Online Supports 
=>Individual Attention 
=>100% Satisfaction 
In Project Based Implementation we give maximum 
exposure to students in 
=>Project Requirement Specification 
=>Software Requirement Specification 
=>Coding Techniques 
=>Project flow Diagram 
=>Project Documentation 
=>Project Testing 
=>PPT preparation 
=>Project Based viva questions 
=>Project Based Interview questions for Placements
Projects Technology 
@LeMeniz Infotech 
LeMeniz Infotech 
For More IEEE Projects Titles 
Visit : www.lemenizinfotech.com
LeMeniz Infotech 
Projects Domains 
@LeMeniz Infotech 
For More IEEE Projects Titles 
Visit : www.lemenizinfotech.com
K-Anonymity for Crowdsourcing Database 
@LeMeniz Infotech
Abstract 
In crowdsourcing database, human operators are embedded into the 
database engine and collaborate with other conventional database 
operators to process the queries. Each human operator publishes small HITs 
(Human Intelligent Task) to the crowdsourcing platform, which consists of a 
set of database records and corresponding questions for human workers. 
The human workers complete the HITs and return the results to the 
crowdsourcing database for further processing. In practice, published 
records in HITs may contain sensitive attributes, probably causing privacy 
leakage so that malicious workers could link them with other public 
databases to reveal individual private information. Conventional privacy 
protection techniques, such as K-Anonymity, can be applied to partially 
solve the problem. However, after generalizing the data, the result of 
standard K-Anonymity algorithms may render uncontrollable information 
loss and affects the accuracy of crowdsourcing. In this paper, we first study 
the tradeoff between the privacy and accuracy for the human operator 
within data anonymization process
Introduction 
After the employer submits his job to the crowdsourcing platform, 
thousands of registered workers will become his candidate employees to 
provide the labor on demand. Similar to the Cloud system, the 
crowdsourcing platforms charge their users by the payas- you-go model. 
They are now considered as the largest online human resource providers. 
The LaaS model in crowdsourcing allows us to exploit the unlimited human 
workers to complete the complex jobs, which are hard for the computers. 
The idea has been introduced into the design of database systems to 
process similarity join, fuzzy search and aggregation. In those systems, new 
database operators involving human labors are implemented to utilize the 
power of the crowd.
EXISTING SYSTEM 
The effect of K-Anonymity on the crowdsourcing results. We formulate the 
problem using a matrix representation. Each entry of the matrix denotes the 
probability that human workers return certain answer on a particular 
record. This model enables us to estimate the lower bound and upper 
bound of the accuracy for the K-Anonymity results. These bounds provide 
overall guidelines on the possible reduction on the utility of K-Anonymity 
before crowdsourcing the records.
PROPOSED SYSTEM 
• we introduce the human operator and formalize the K-anonymity 
requirement for the human operator. 
• we analyze the effect of anonymity on the results of crowdsourcing. We 
present our matrix-based probability model. 
• we propose our feedback-based approach, which adaptively partitions the 
space based on the crowdsourcing results. 
• Evaluates the proposed approach using real dataset and Section 6 reviews 
previous work on crowdsourcing and K-anonymity.
Advantages 
• A probability-based matrix model is introduced to estimate 
the lower bound and upper bound of the crowdsourcing 
accuracy for the anonymized data. 
• The model shows that K-Anonymity approach needs to 
solve the trade-off between the privacy and the accuracy. 
• Experiments on three different datasets show that our 
solution can maintain high accuracy results for the 
crowdsourcing jobs.
Reference 
A. Feng et al. “CrowdDB: Query processing with the VLDB 
crowd,” Proc. VLDB, vol. 4, no. 12, pp. 1387–1390, 2011.
Hardware Specification 
Processor : Any Processor above 500 MHz. 
Ram : 128Mb. 
Hard Disk : 10 Gb. 
Compact Disk : 650 Mb. 
Input device : Standard Keyboard and Mouse. 
Output device : VGA and High Resolution Monitor.
Software Specification 
Operating System : Windows Family. 
Programming Language : ASP.NET, C#.Net. 
Database : SQL Server 2005
K-Anonymity for Crowdsourcing Database 
To Get this Project with 
Complete Document 
Reach Us : 
LeMeniz Infotech 
36, 100 Feet Road, 
Natesan Nagar, 
Near Indira Gandhi Statue, 
Pondicherry-605 005. 
Call: 0413-4205444, 
+91 99625 88976, 
95663 55386. 
We Are Ready for You 
For More Project Title Call Us Rafee 
9962588976 / 9566355386 
Mail : projects@lemenizinfotech.com

Weitere ähnliche Inhalte

Was ist angesagt?

Scalable Discovery Of Hidden Emails From Large Folders
Scalable Discovery Of Hidden Emails From Large FoldersScalable Discovery Of Hidden Emails From Large Folders
Scalable Discovery Of Hidden Emails From Large Folders
feiwin
 
Performance analysis on secured data method in natural language steganography
Performance analysis on secured data method in natural language steganographyPerformance analysis on secured data method in natural language steganography
Performance analysis on secured data method in natural language steganography
journalBEEI
 
Finding Similar Files in Large Document Repositories
Finding Similar Files in Large Document RepositoriesFinding Similar Files in Large Document Repositories
Finding Similar Files in Large Document Repositories
feiwin
 

Was ist angesagt? (20)

Neural Information Retrieval: In search of meaningful progress
Neural Information Retrieval: In search of meaningful progressNeural Information Retrieval: In search of meaningful progress
Neural Information Retrieval: In search of meaningful progress
 
Problems in Technology to Use Anonymized Personal Data
Problems in Technology to Use Anonymized Personal DataProblems in Technology to Use Anonymized Personal Data
Problems in Technology to Use Anonymized Personal Data
 
Ju3517011704
Ju3517011704Ju3517011704
Ju3517011704
 
Scalable Discovery Of Hidden Emails From Large Folders
Scalable Discovery Of Hidden Emails From Large FoldersScalable Discovery Of Hidden Emails From Large Folders
Scalable Discovery Of Hidden Emails From Large Folders
 
Probablistic information retrieval
Probablistic information retrievalProbablistic information retrieval
Probablistic information retrieval
 
Performance analysis on secured data method in natural language steganography
Performance analysis on secured data method in natural language steganographyPerformance analysis on secured data method in natural language steganography
Performance analysis on secured data method in natural language steganography
 
Twitter analysis by Kaify Rais
Twitter analysis by Kaify RaisTwitter analysis by Kaify Rais
Twitter analysis by Kaify Rais
 
Haystack 2018 - Algorithmic Extraction of Keywords Concepts and Vocabularies
Haystack 2018 - Algorithmic Extraction of Keywords Concepts and VocabulariesHaystack 2018 - Algorithmic Extraction of Keywords Concepts and Vocabularies
Haystack 2018 - Algorithmic Extraction of Keywords Concepts and Vocabularies
 
FLOWER VOICE: VIRTUAL ASSISTANT FOR OPEN DATA
FLOWER VOICE: VIRTUAL ASSISTANT FOR OPEN DATAFLOWER VOICE: VIRTUAL ASSISTANT FOR OPEN DATA
FLOWER VOICE: VIRTUAL ASSISTANT FOR OPEN DATA
 
An approach to source code plagiarism
An approach to source code plagiarismAn approach to source code plagiarism
An approach to source code plagiarism
 
Boundary Between Pseudonymity and Anonymity
Boundary Between Pseudonymity and AnonymityBoundary Between Pseudonymity and Anonymity
Boundary Between Pseudonymity and Anonymity
 
Haystacks slides
Haystacks slidesHaystacks slides
Haystacks slides
 
Final Report(SuddhasatwaSatpathy)
Final Report(SuddhasatwaSatpathy)Final Report(SuddhasatwaSatpathy)
Final Report(SuddhasatwaSatpathy)
 
Semi-Supervised Keyphrase Extraction on Scientific Article using Fact-based S...
Semi-Supervised Keyphrase Extraction on Scientific Article using Fact-based S...Semi-Supervised Keyphrase Extraction on Scientific Article using Fact-based S...
Semi-Supervised Keyphrase Extraction on Scientific Article using Fact-based S...
 
Named Entity Recognition from Online News
Named Entity Recognition from Online NewsNamed Entity Recognition from Online News
Named Entity Recognition from Online News
 
Cg4201552556
Cg4201552556Cg4201552556
Cg4201552556
 
Finding Similar Files in Large Document Repositories
Finding Similar Files in Large Document RepositoriesFinding Similar Files in Large Document Repositories
Finding Similar Files in Large Document Repositories
 
Indonesian language email spam detection using N-gram and Naïve Bayes algorithm
Indonesian language email spam detection using N-gram and Naïve Bayes algorithmIndonesian language email spam detection using N-gram and Naïve Bayes algorithm
Indonesian language email spam detection using N-gram and Naïve Bayes algorithm
 
Using a keyword extraction pipeline to understand concepts in future work sec...
Using a keyword extraction pipeline to understand concepts in future work sec...Using a keyword extraction pipeline to understand concepts in future work sec...
Using a keyword extraction pipeline to understand concepts in future work sec...
 
Web search engines
Web search enginesWeb search engines
Web search engines
 

Andere mochten auch

k Nearest Neighbor
k Nearest Neighbork Nearest Neighbor
k Nearest Neighbor
butest
 
STEPS Home Care ppt_New
STEPS Home Care ppt_NewSTEPS Home Care ppt_New
STEPS Home Care ppt_New
Shan Wade
 
Camps gaëlle et lilou
Camps   gaëlle et lilouCamps   gaëlle et lilou
Camps gaëlle et lilou
mdrouet44
 

Andere mochten auch (16)

Protecting sensitive labels in social network data anonymization
Protecting sensitive labels in social network data anonymizationProtecting sensitive labels in social network data anonymization
Protecting sensitive labels in social network data anonymization
 
Lions, zebras and Big Data Anonymization
Lions, zebras and Big Data AnonymizationLions, zebras and Big Data Anonymization
Lions, zebras and Big Data Anonymization
 
KNN
KNN KNN
KNN
 
k Nearest Neighbor
k Nearest Neighbork Nearest Neighbor
k Nearest Neighbor
 
Data Mining and Business Intelligence Tools
Data Mining and Business Intelligence ToolsData Mining and Business Intelligence Tools
Data Mining and Business Intelligence Tools
 
K to 12 General Presentation
K to 12 General PresentationK to 12 General Presentation
K to 12 General Presentation
 
Incentive based data sharing in delay tolerant mobile networks
Incentive based data sharing in delay tolerant mobile networksIncentive based data sharing in delay tolerant mobile networks
Incentive based data sharing in delay tolerant mobile networks
 
Wishclub Compensation Plan (EN)
Wishclub Compensation Plan (EN)Wishclub Compensation Plan (EN)
Wishclub Compensation Plan (EN)
 
A novel pwm high voltage conversion ratio bi directional three-phase dcdc con...
A novel pwm high voltage conversion ratio bi directional three-phase dcdc con...A novel pwm high voltage conversion ratio bi directional three-phase dcdc con...
A novel pwm high voltage conversion ratio bi directional three-phase dcdc con...
 
STEPS Home Care ppt_New
STEPS Home Care ppt_NewSTEPS Home Care ppt_New
STEPS Home Care ppt_New
 
How to Get Involved in the Magento Community #mm16ar
How to Get Involved in the Magento Community #mm16arHow to Get Involved in the Magento Community #mm16ar
How to Get Involved in the Magento Community #mm16ar
 
Ultra sparse ac link converters
Ultra sparse ac link convertersUltra sparse ac link converters
Ultra sparse ac link converters
 
Evaluation question 1 (digi pack)
Evaluation question 1 (digi pack)Evaluation question 1 (digi pack)
Evaluation question 1 (digi pack)
 
Q1
Q1Q1
Q1
 
Camps gaëlle et lilou
Camps   gaëlle et lilouCamps   gaëlle et lilou
Camps gaëlle et lilou
 
Lakkadi in Wayanad
Lakkadi in WayanadLakkadi in Wayanad
Lakkadi in Wayanad
 

Ähnlich wie K anonymity for crowdsourcing database

La bi, l'informatique décisionnelle et les graphes
La bi, l'informatique décisionnelle et les graphesLa bi, l'informatique décisionnelle et les graphes
La bi, l'informatique décisionnelle et les graphes
Cédric Fauvet
 
M phil-computer-science-data-mining-projects
M phil-computer-science-data-mining-projectsM phil-computer-science-data-mining-projects
M phil-computer-science-data-mining-projects
Vijay Karan
 

Ähnlich wie K anonymity for crowdsourcing database (20)

La bi, l'informatique décisionnelle et les graphes
La bi, l'informatique décisionnelle et les graphesLa bi, l'informatique décisionnelle et les graphes
La bi, l'informatique décisionnelle et les graphes
 
M.E Computer Science Data Mining Projects
M.E Computer Science Data Mining ProjectsM.E Computer Science Data Mining Projects
M.E Computer Science Data Mining Projects
 
M phil-computer-science-data-mining-projects
M phil-computer-science-data-mining-projectsM phil-computer-science-data-mining-projects
M phil-computer-science-data-mining-projects
 
M.Phil Computer Science Data Mining Projects
M.Phil Computer Science Data Mining ProjectsM.Phil Computer Science Data Mining Projects
M.Phil Computer Science Data Mining Projects
 
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
 
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
 
Bulk Ieee Projects 2013 @ Seabirds ( Chennai, Trichy, Hyderabad, Pune, Mumbai )
Bulk Ieee Projects 2013 @ Seabirds ( Chennai, Trichy, Hyderabad, Pune, Mumbai )Bulk Ieee Projects 2013 @ Seabirds ( Chennai, Trichy, Hyderabad, Pune, Mumbai )
Bulk Ieee Projects 2013 @ Seabirds ( Chennai, Trichy, Hyderabad, Pune, Mumbai )
 
Ieee projects-2013-2014-title-list-for-me-be-mphil-final-year-students
Ieee projects-2013-2014-title-list-for-me-be-mphil-final-year-studentsIeee projects-2013-2014-title-list-for-me-be-mphil-final-year-students
Ieee projects-2013-2014-title-list-for-me-be-mphil-final-year-students
 
Ieee Projects 2013 for Cse @ Seabirds(Trichy, Pudukkottai, Perambalur, Thanja...
Ieee Projects 2013 for Cse @ Seabirds(Trichy, Pudukkottai, Perambalur, Thanja...Ieee Projects 2013 for Cse @ Seabirds(Trichy, Pudukkottai, Perambalur, Thanja...
Ieee Projects 2013 for Cse @ Seabirds(Trichy, Pudukkottai, Perambalur, Thanja...
 
Cloud java titles adrit solutions
Cloud java titles adrit solutionsCloud java titles adrit solutions
Cloud java titles adrit solutions
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# Projects
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# Projects
 
IRJET- E-MORES: Efficient Multiple Output Regression for Streaming Data
IRJET- E-MORES: Efficient Multiple Output Regression for Streaming DataIRJET- E-MORES: Efficient Multiple Output Regression for Streaming Data
IRJET- E-MORES: Efficient Multiple Output Regression for Streaming Data
 
Networking java titles Adrit Solution
Networking java titles Adrit SolutionNetworking java titles Adrit Solution
Networking java titles Adrit Solution
 
Parallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot netParallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot net
 
Cloud computing for java and dotnet
Cloud computing for java and dotnetCloud computing for java and dotnet
Cloud computing for java and dotnet
 
The Why and How of Applications with APIs and microservices
The Why and How of Applications with APIs and microservicesThe Why and How of Applications with APIs and microservices
The Why and How of Applications with APIs and microservices
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
 
Data-Driven Transformation: Leveraging Big Data at Showtime with Apache Spark
Data-Driven Transformation: Leveraging Big Data at Showtime with Apache SparkData-Driven Transformation: Leveraging Big Data at Showtime with Apache Spark
Data-Driven Transformation: Leveraging Big Data at Showtime with Apache Spark
 
Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17
 

Mehr von LeMeniz Infotech

Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
LeMeniz Infotech
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
LeMeniz Infotech
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
LeMeniz Infotech
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
LeMeniz Infotech
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
LeMeniz Infotech
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
LeMeniz Infotech
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
LeMeniz Infotech
 

Mehr von LeMeniz Infotech (20)

A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
 
A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impaired
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android apps
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication scheme
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

K anonymity for crowdsourcing database

  • 3. LeMeniz Infotech LeMeniz Infotech a Leading Software Concern in Pondicherry Stepping in IEEE Projects 2014- 2015. We are Proud to Presents Android App for IEEE Projects Titles 2014-2015. Download From : www.ieeeprojectspondicherrry.weebly.com Student Benefits: =>No False Commitment =>Real Time Implementation ->27 X 7 Online Supports =>Individual Attention =>100% Satisfaction In Project Based Implementation we give maximum exposure to students in =>Project Requirement Specification =>Software Requirement Specification =>Coding Techniques =>Project flow Diagram =>Project Documentation =>Project Testing =>PPT preparation =>Project Based viva questions =>Project Based Interview questions for Placements
  • 4. Projects Technology @LeMeniz Infotech LeMeniz Infotech For More IEEE Projects Titles Visit : www.lemenizinfotech.com
  • 5. LeMeniz Infotech Projects Domains @LeMeniz Infotech For More IEEE Projects Titles Visit : www.lemenizinfotech.com
  • 6. K-Anonymity for Crowdsourcing Database @LeMeniz Infotech
  • 7. Abstract In crowdsourcing database, human operators are embedded into the database engine and collaborate with other conventional database operators to process the queries. Each human operator publishes small HITs (Human Intelligent Task) to the crowdsourcing platform, which consists of a set of database records and corresponding questions for human workers. The human workers complete the HITs and return the results to the crowdsourcing database for further processing. In practice, published records in HITs may contain sensitive attributes, probably causing privacy leakage so that malicious workers could link them with other public databases to reveal individual private information. Conventional privacy protection techniques, such as K-Anonymity, can be applied to partially solve the problem. However, after generalizing the data, the result of standard K-Anonymity algorithms may render uncontrollable information loss and affects the accuracy of crowdsourcing. In this paper, we first study the tradeoff between the privacy and accuracy for the human operator within data anonymization process
  • 8. Introduction After the employer submits his job to the crowdsourcing platform, thousands of registered workers will become his candidate employees to provide the labor on demand. Similar to the Cloud system, the crowdsourcing platforms charge their users by the payas- you-go model. They are now considered as the largest online human resource providers. The LaaS model in crowdsourcing allows us to exploit the unlimited human workers to complete the complex jobs, which are hard for the computers. The idea has been introduced into the design of database systems to process similarity join, fuzzy search and aggregation. In those systems, new database operators involving human labors are implemented to utilize the power of the crowd.
  • 9. EXISTING SYSTEM The effect of K-Anonymity on the crowdsourcing results. We formulate the problem using a matrix representation. Each entry of the matrix denotes the probability that human workers return certain answer on a particular record. This model enables us to estimate the lower bound and upper bound of the accuracy for the K-Anonymity results. These bounds provide overall guidelines on the possible reduction on the utility of K-Anonymity before crowdsourcing the records.
  • 10. PROPOSED SYSTEM • we introduce the human operator and formalize the K-anonymity requirement for the human operator. • we analyze the effect of anonymity on the results of crowdsourcing. We present our matrix-based probability model. • we propose our feedback-based approach, which adaptively partitions the space based on the crowdsourcing results. • Evaluates the proposed approach using real dataset and Section 6 reviews previous work on crowdsourcing and K-anonymity.
  • 11. Advantages • A probability-based matrix model is introduced to estimate the lower bound and upper bound of the crowdsourcing accuracy for the anonymized data. • The model shows that K-Anonymity approach needs to solve the trade-off between the privacy and the accuracy. • Experiments on three different datasets show that our solution can maintain high accuracy results for the crowdsourcing jobs.
  • 12. Reference A. Feng et al. “CrowdDB: Query processing with the VLDB crowd,” Proc. VLDB, vol. 4, no. 12, pp. 1387–1390, 2011.
  • 13. Hardware Specification Processor : Any Processor above 500 MHz. Ram : 128Mb. Hard Disk : 10 Gb. Compact Disk : 650 Mb. Input device : Standard Keyboard and Mouse. Output device : VGA and High Resolution Monitor.
  • 14. Software Specification Operating System : Windows Family. Programming Language : ASP.NET, C#.Net. Database : SQL Server 2005
  • 15. K-Anonymity for Crowdsourcing Database To Get this Project with Complete Document Reach Us : LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 99625 88976, 95663 55386. We Are Ready for You For More Project Title Call Us Rafee 9962588976 / 9566355386 Mail : projects@lemenizinfotech.com