Вы находитесь на странице: 1из 5

ANONYMYZING HOSPITAL DATA

A PROJECT REPORT submitted by

SARANYA .T 08BCE284 VINOTHINI.B 08BCE359

in partial fulfilment for the award of the degree of B.TECH in COMPUTER SCIENCE AND ENGINEERING

Vellore 632 014, Tamil Nadu, India

SCHOOL OF COMPUTING SCIENCE AND ENGINEERING


NOVEMBER 2011
i

DECLARATION BY THE CANDIDATE

I hereby declare that the mini-project report entitled Anonymizing Hospital Data submitted by me to Vellore Institute of Technology, Vellore in partial fulfillment of the requirement for the award of the degree of Bachelor of Technology in Computer Science and Engineering is a record of bonafide mini-project undertaken by me under the supervision of Prof. Geetha Mary. A. I further declare that the work reported in this report has not been submitted and will not be submitted, either in part or in full, for the award of any other degree or diploma in this institute or any other institute or university.

Vellore

Signature of the Candidates

Date:16-11-2011

ii

Vellore 632 014, Tamil Nadu, India

School of Computing Science & Engineering BONAFIDE CERTIFICATE


This is to certify that the mini-project report entitled Anonymizing Hospital Data submitted by VINOTHINI.B (08BCE359) and SARANYA.T (08BCE284) to Vellore Institute of Technology, Vellore in partial fulfilment of the requirement for the award of the degree of Bachelor of Technology in Computer Science and Engineering is a record of bonafide mini-project undertaken by them under my supervision. The mini-project fulfils the

requirements as per the regulations of this Institute and in my opinion meets the necessary standards for submission. The contents of this report have not been submitted and will not be submitted either in part or in full, for the award of any other degree or diploma in this institute or any other institute or university.

SUPERVISOR

Prof. Geetha Mary. A (Assistant Professor)


Date: 16-11-2011

Internal Examiner (s)

External Examiner (s)

iii

TABLE OF CONTENTS:
CHAPTER NO TITLE PAGE NO

ABSTRACT

LIST OF FIGURES

1.
1.1 AIM

INTRODUCTION

2 2 2 2 2 2 3 3 3 4 4 4 4

1.2 OBJECTIVE

1.3 MOTIVATION

2.

LITERATURE SURVEY 2.1 t-Closeness: Privacy Beyond k-Anonymity and l-Diversity

.3. 3.1 Limitation 3.2 Example

K-ANONYMITY

3.3 Suppression of k-anonymity 4. 4.1 Definition 4.2 Limitation L-DIVERSITY

iv

4.3 Suppression of l-diversity 5. T-CLOSENESS 5.1 Definition 5.2 Calculations 5.2.1 EMD 5.2.2 Equal Distance 5.2.3 Hierarichal distance 5.3 Suppression of t-closeness 5.4 Table after t-closeness 6. REQUIREMENTS 6.1 Hardware requirements 6.2 software requirements 7. DESIGN 7.1 Architectural diagram 8. DISTANCE CALCULATION 8.1Generalising the attributes 8.2 Generate the result in tabular form 9. 10. 11. CODE IMPLEMENTATION SNAPSHOTS REFERENCES

5 5 6 6 6 6 6 7 7 7 7 7 8 8 8 8 9 9 15 16

Вам также может понравиться