Publication:
Data integration and data privacy through �Pay-As-You-Go� approach

dc.citedby2
dc.contributor.authorLydia E.L.en_US
dc.contributor.authorPandiselvam R.en_US
dc.contributor.authorSaranya R.en_US
dc.contributor.authorKirutikaa U.S.en_US
dc.contributor.authorIlayaraja M.en_US
dc.contributor.authorShankar K.en_US
dc.contributor.authorMaseleno A.en_US
dc.contributor.authorid57196059278en_US
dc.contributor.authorid57196346443en_US
dc.contributor.authorid57212525827en_US
dc.contributor.authorid57210203124en_US
dc.contributor.authorid55662288300en_US
dc.contributor.authorid56884031900en_US
dc.contributor.authorid55354910900en_US
dc.date.accessioned2023-05-29T07:29:40Z
dc.date.available2023-05-29T07:29:40Z
dc.date.issued2019
dc.description.abstractData Analytics has taken important and demanding problems in the research areas such as computer science, biology, medicine, finance, and homeland security. This research paper has resolved the problem of Entity resolution(ER) which recognizes the database records, which referred to the same real-world entity. The latest explosion of data made ER a impeach problem in a large range of applications. This paper proposed a scalable ER approach, used on-board datasets. Our latest approaches are simple because they consider either the entire ER process or the function, which are matching, and merging records as a black box procedure and used in a large range of ER applications. Pay-as-you-go approach for ER was a limit on the resources (e.g., work, runtime). This made the maximum progress as possible as required. This paper suggests scalable ER methods and new ER functionalities that have been not studied in the previous. Entity Resolution as a black-box operation provides general mechanisms which be used across applications. Further, the issue of managing information leakage, where one must try to avoid important bits of data from resolved by Entity Resolution, to sage against the loss of data privacy. As more of our sensitive data gets unprotected to various merchants, health care providers, employers, social sites and so on, there is a large chance that an adversary can "connect the dots" and piece together our data, which leads to even more damage of privacy. Thus to measure the quantifying data leakage, we use "disinformation" as a device which containing data leakage. � 2019, Research Trend. All rights reserved.en_US
dc.description.natureFinalen_US
dc.identifier.epage173
dc.identifier.issue2
dc.identifier.scopus2-s2.0-85070650406
dc.identifier.spage167
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85070650406&partnerID=40&md5=3f7beecd5dd378fa4cc92a11536d5cfa
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/24974
dc.identifier.volume10
dc.publisherResearch Trenden_US
dc.sourceScopus
dc.sourcetitleInternational Journal on Emerging Technologies
dc.titleData integration and data privacy through �Pay-As-You-Go� approachen_US
dc.typeArticleen_US
dspace.entity.typePublication
Files
Collections