K anonymity for crowdsourcing database
In crowdsourcing database, human operators are embedded into the database engine and collaborate with other conventional database operators to process the queries. Each human operator publishes small HITs (Human Intelligent Task) to the crowdsourcing platform, which consists of a set of database records and corresponding questions for human workers.
3. LeMeniz Infotech
LeMeniz Infotech a Leading Software Concern in Pondicherry Stepping in IEEE Projects 2014-
2015. We are Proud to Presents Android App for IEEE Projects Titles 2014-2015.
Download From : www.ieeeprojectspondicherrry.weebly.com
Student Benefits:
=>No False Commitment
=>Real Time Implementation
->27 X 7 Online Supports
=>Individual Attention
=>100% Satisfaction
In Project Based Implementation we give maximum
exposure to students in
=>Project Requirement Specification
=>Software Requirement Specification
=>Coding Techniques
=>Project flow Diagram
=>Project Documentation
=>Project Testing
=>PPT preparation
=>Project Based viva questions
=>Project Based Interview questions for Placements
4. Projects Technology
@LeMeniz Infotech
LeMeniz Infotech
For More IEEE Projects Titles
Visit : www.lemenizinfotech.com
5. LeMeniz Infotech
Projects Domains
@LeMeniz Infotech
For More IEEE Projects Titles
Visit : www.lemenizinfotech.com
7. Abstract
In crowdsourcing database, human operators are embedded into the
database engine and collaborate with other conventional database
operators to process the queries. Each human operator publishes small HITs
(Human Intelligent Task) to the crowdsourcing platform, which consists of a
set of database records and corresponding questions for human workers.
The human workers complete the HITs and return the results to the
crowdsourcing database for further processing. In practice, published
records in HITs may contain sensitive attributes, probably causing privacy
leakage so that malicious workers could link them with other public
databases to reveal individual private information. Conventional privacy
protection techniques, such as K-Anonymity, can be applied to partially
solve the problem. However, after generalizing the data, the result of
standard K-Anonymity algorithms may render uncontrollable information
loss and affects the accuracy of crowdsourcing. In this paper, we first study
the tradeoff between the privacy and accuracy for the human operator
within data anonymization process
8. Introduction
After the employer submits his job to the crowdsourcing platform,
thousands of registered workers will become his candidate employees to
provide the labor on demand. Similar to the Cloud system, the
crowdsourcing platforms charge their users by the payas- you-go model.
They are now considered as the largest online human resource providers.
The LaaS model in crowdsourcing allows us to exploit the unlimited human
workers to complete the complex jobs, which are hard for the computers.
The idea has been introduced into the design of database systems to
process similarity join, fuzzy search and aggregation. In those systems, new
database operators involving human labors are implemented to utilize the
power of the crowd.
9. EXISTING SYSTEM
The effect of K-Anonymity on the crowdsourcing results. We formulate the
problem using a matrix representation. Each entry of the matrix denotes the
probability that human workers return certain answer on a particular
record. This model enables us to estimate the lower bound and upper
bound of the accuracy for the K-Anonymity results. These bounds provide
overall guidelines on the possible reduction on the utility of K-Anonymity
before crowdsourcing the records.
10. PROPOSED SYSTEM
• we introduce the human operator and formalize the K-anonymity
requirement for the human operator.
• we analyze the effect of anonymity on the results of crowdsourcing. We
present our matrix-based probability model.
• we propose our feedback-based approach, which adaptively partitions the
space based on the crowdsourcing results.
• Evaluates the proposed approach using real dataset and Section 6 reviews
previous work on crowdsourcing and K-anonymity.
11. Advantages
• A probability-based matrix model is introduced to estimate
the lower bound and upper bound of the crowdsourcing
accuracy for the anonymized data.
• The model shows that K-Anonymity approach needs to
solve the trade-off between the privacy and the accuracy.
• Experiments on three different datasets show that our
solution can maintain high accuracy results for the
crowdsourcing jobs.
12. Reference
A. Feng et al. “CrowdDB: Query processing with the VLDB
crowd,” Proc. VLDB, vol. 4, no. 12, pp. 1387–1390, 2011.
13. Hardware Specification
Processor : Any Processor above 500 MHz.
Ram : 128Mb.
Hard Disk : 10 Gb.
Compact Disk : 650 Mb.
Input device : Standard Keyboard and Mouse.
Output device : VGA and High Resolution Monitor.
15. K-Anonymity for Crowdsourcing Database
To Get this Project with
Complete Document
Reach Us :
LeMeniz Infotech
36, 100 Feet Road,
Natesan Nagar,
Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444,
+91 99625 88976,
95663 55386.
We Are Ready for You
For More Project Title Call Us Rafee
9962588976 / 9566355386
Mail : projects@lemenizinfotech.com