Volume-4 Issue-12

Download 6
Total Views 373
File Size 4.00 KB
File Type unknown
Create Date September 7, 2017
Last Updated October 20, 2017

 Download Abstract Book

S. No

Volume-4 Issue-12, July 2017, ISSN:  2319–6378 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.



Gouri Namdeo Kale, S. N. Kini

Paper Title:

Privacy Preserving Utility Verification and Security of Data Published by Non-Interactive Differentially Private Mechanisms

Abstract: Service providers have the skill to collect large amounts of user data. Sometimes, a set of providers may attempt to combine their data for particular data mining tasks. In this process, how to keep users’ privacy is very critical. Many Users write an own novel, personal story and private dataset, each user need to preserve this data harmless on own site and with user internet amounts of user data. Sometimes, a set of providers may attempt to combine their data for particular data mining tasks. In this process, how to keep users’ privacy is very critical. Many Users write an own novel, personal story and private dataset, each user need to preserve this data harmless on own site and with user internet facility user always search a digital publisher. This is the so-called privacy-preserving collaborative data publishing problem. In this paper, we deliberate the collaborative data publishing problem for anonymizing horizontally partitioned data at several data providers. Meanwhile most anonymization methods have bad impact on data utility. However, this task is non-trivial for the reason the utility measuring usually requires the aggregated raw data, which is not exposed to the data users due to privacy concerns. The paper addresses this new threat, and makes several contributions.

Keywords: Data Privacy, Data security. double level Encryption, Utility verification

1.    L. Fan, L. Xiong, and V. Sunderam, FAST: Differentially private real-time aggregate monitor with filtering and adaptive sampling, in Proc. ACM SIGMOD Int. Conf. Manage. Data (SIGMOD), 2013, pp. 10651068
2.    R. Chen, B. C. M. Fung, and B. C. Desai. (2011). “Differentially private trajectory data publication.” [Online]. Available: http://arxiv.org/abs/1112.2020.
3.    D. M. Freeman, Converting pairing-based cryptosystems from composite order groups to prime-order groups, in Proc. 29th Annu. Int. Conf. Theory Appl. Cryptogr. Techn. (EUROCRYPT), 2010, pp. 4461.
4.    B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu, Privacy-preserving data publishing: A survey of recent developments, ACM Compute. Surv., vol. 42, no. 4, 2010, Art. no. 14.
5.    Y. Hong, J. Vaidya, H. Lu, P. Karras, and S. Goel, Collaborative search log sanitization: Toward differential privacy and boosted utility, IEEE Trans. Dependable Secure Comput., vol. 12, no. 5, pp. 504518, Sep./Oct. 2015.
6.    W. Jiang and C. Clifton, A secure distributed framework for achieving k-anonymity, Int. J. Very Large Data Bases, vol. 15, no. 4, pp. 316333, Nov. 2006.





Sharda Dubey, Sumit Gupta

Paper Title:

An Inventive Method for Detection and Prevention Against ARP Attacks

Abstract:  ARP poisoning is the most perilous assault that endangers the working of MANET. This assault originates from the way the ARP convention works, since it is a stateless convention. This ARP assault might be utilized to dispatch either foreswearing of administration (DoS) assaults or Man in the middle (MITM) assaults. In order to deal with such problem there exist methods for utilizing static ARP sections to anticipate ARP parodying. However, ARP mocking relief techniques relying upon static ARP have significant disadvantages. In this paper, we propose a versatile method to counteract ARP assaults, which naturally designs static ARP sections and here each host in the neighbourhood system will have a secured non-satirize ARP store. The works is proposed by using both static and DHCP based tending to plans a system that permits securing of a substantial number of clients with no overhead. Execution investigation of the system has been led by utilizing a genuine system. The estimation comes and it is found that the customer or any node needs close to one millisecond to en-roll itself for a secured ARP reserve. The outcomes likewise demonstrated that the node participating can easily be detected and prevented by the proposed work in only few microsecond under substantial activity.

Keywords:  ARP spoofing; Static ARP entries, MAC address, Spoof detection.

1.          Yafeng Xu and Shuwen Sun , “The study on the college campus network ARP deception defense," 2010 2nd International Conference on Future Computer and Communication (ICFCC), 3(1), pp. 465-467, May 2010.
2.          R. W. Stevens. TCP/IP Illustrated, Volume 1: The Protocols. Addison–Wesley Professional Computing Series, January 1994.
3.          D. Plummer. An Ethernet address resolution protocol, Nov. 1982. RFC 826.
4.          Mohamed Al-Hemairy, Saad Amin, and Zouheir Trabelsi, “Towards More Sophisticated ARP Spoofing Detection/ Prevention Systems in LAN Networks," 2009 International Conference on the Current Trends in Information Technology (CTIT), pp.1-6, December 2009.
5.          Hu Xiangdong, Gao Zhan, and Li Wei "Research on the Switched LAN Monitor Mechanism and its Implementation Method based on ARP spoofing," International Conference on Management and Service Science.( MASS '09), pp. 1-4, Sept. 2009.
6.          Marco Antônio Carnut and João J. C. Gondim, "ARP spoofing detection on switched ethernet networks: a feasibility study," 5th Symposium on Security in Informatics held at Brazilian Air Force Technology Institute, November 2003.
7.          Cristina L. Abad and Rafael I. Bonilla, "An Analysis on the Schemes for Detecting and Preventing ARP Cache Poisoning Attacks," 27th International Conference on Distributed Computing Systems Workshops, 2007. (ICDCSW '07), page(s): 60, June 2007.
8.          Somnuk Puangpronpitag and Narongrit Masusai, “An Efficient and Feasible Solution to ARP Spoof Problem," 6th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, 2009. (ECTI-CON 2009), 3(1), pp. 910—913, May 2009.
9.          S. Whalen, "An introduction to ARP spoofing," 2600: The Hacker Quarterly, 18(3), 2001, (accessed 13-9-2012). [Online].:http://servv89pn0aj.sn.sourcedns.com/gbpprorg/2600/arp spoofing intro.pdf
10.       http://technet.microsoft.com/en-us/library/cc958841.aspx. ARP Cache, (accessed May 8, 2013).
11.       Zouheir Trabelsi and Wassim El-Hajj, "Preventing ARP Attacks using a Fuzzy-Based Stateful ARP Cache," IEEE International Conference on Communications.( ICC '07), pp. 1355 -1360, June 2007.
12.       Dr. S. G. Bhirud and Vijay Katkar, "Light Weight Approach for IP-ARP Spoofing Detection and Prevention," 2011 Second Asian Himalayas International Conference on Internet (AH-ICI), page(s):1-5, November 2011.
13.       Xiangning HOU, Zhiping JIANG, and Xinli TIAN, "The detection and prevention for ARP Spoofing based on Snort," 2010 I
14.       Andre P. Ortega, Xavier E. Marcos, Luis D. Chiang and Cristina L. Abad, " Preventing ARP cache poisoning attacks:  A proof of concept using OpenWrt," Latin American Network Operations and Management Symposium. (LANOMS), pp. 1-9, Oct. 2009.
15.       Ai-zeng Qian, "The Automatic Prevention and Control Research of ARP Deception and Implementation," 2009 WRI World Congress on Computer Science and Information Engineering, , 2(1), pp. 555-558, April 2009.
16.       Boughrara, A.; Mammar, S., "Implementation of a SNORT's output Plug-In in reaction to ARP Spoofing's attack," 2012 6th International Conference on Sciences of Electronics Technologies of Information and Telecommunications (SETIT), pp.643,647, 21-24 March 2012 17.       R. K. Jain, “The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling,” Prince Hall, April 1991.
18.       Ferdous A. Barbhuiya, Santosh Biswas, NeminathHubballi,”A Host Based DES Approach for Detecting ARPSpoofing”, IEEE, 2011.
19.       TAO Jun, LIN Hui, “IDSV: Intrusion Detection Algorithm based on Statistics Variance Method in User Transmission Behavior”, International Conference on Computational and Information Sciences, 2010.

20.       JanghunBae, SeongjinAhn, “Network Access Control and Management using ARP Spoofing in Various Windows Environment”, IEEE, 2011.





Raaed Faleh Hassan, Safa Majed Mohammed

Paper Title:

Design and Implementation of  Real time ECG Circuit Based On FPGA

Abstract: The diagnosing of the heart abnormality can benefit from the availability of analyzing techniques for the electrocardiogram (ECG) signal. A system which is acquire ECG signal and extract the heart activity features has been designed and implemented in this paper. The implemented system includes four stages; signal acquiring stage, signal conditioning stage, transmission channel stage, and diagnosing stage. Three electrodes are placed on the left and right arm and left leg of the patient for acquiring ECG signal. The second stage is designed for the purpose of amplifying and filtering the acquired weak signal which is corrupted by noise from muscles and electrical source.  The extracted analog ECG signal is converted to the digital signal in this stage also. In order to realize the functionality of this stage, instrumentation amplifier, high pass filter, notch filter, and low pass filter have been implemented to extracting analog ECG. Arduino is configured in this stage for converting the analog ECG signal into digital signal, it is also acts as a gateway to transfer the digital ECG to the transmission channel. Wireless transmission channel has been implemented based on Xbee located at both channel sides. Finally, the core of the diagnosing stage has been designed using Language VHDL language and implemented using Spartan 3AN XC3S700 FPGA Starter Kit board. The algorithm implemented in the diagnosing stage concerned with the detecting of R- peaks in ECG signal. According to a deviation in duration or amplitude of these peaks from the standard values, the diagnosing stage indicates one type of the heart abnormality which is appear at the LCD of FPGA. Experimental tests have been performed for different cases and show promising results toward precise diagnosis of heart irregular activities.

Keywords: ECG Circuit; Arduino; ZigBee; UART; VHDL; FPGA.

1.       R. S. Khandpur, “Handbook of Biomedical Instrumentation”, Tata McGraw-Hill publishing Company Limited, New Delhi 2005.
2.       Stouffer, “Practical ECG Interpretation Clues to Heart Disease in Young Adults”, ISBN: 978-1-405-17928-7, 2009.
3.       M. S. Nambakhsh et. al.,” FPGA-Core Defibrillator using Wavelet- Fuzzy ECG Arrhythmia Classification”, 2008 30th Annual International IEEE EMBS Conference Vancouver, BritishColumbia, Canada.
4.       C. Ken, and L. Xiaoying,” A Zigbee Based Mesh Network for ECG Monitoring System”, 4th international conference on Bioinformatics and Biomedical Engineering (iCBBE), 2010, Chengdu, China.
5.       H.K.Chatterjee  et. al., “An FPGA implementation of real-time QRS detection”, 2011 2nd International Conference on Computer & Communication Technology (ICCCT), Allahabad, India.
6.       C. G. Figueiredo, and T. Michael, “A vlsi architecture for arrhythmia  detection and its implementation on fpga”, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, India.
7.       EL M. El Hassan, and M. Karim, “An FPGA-Based Implementation of a Pre-Processing Stage for ECG Signal Analysis Using DWT”, 2014 Second World Conference on Complex Systems (WCCS),  Agadir, Morocco.
8.       H.K. Chatterjee et. al., “Real time Electrocardiogram wave peak detection algorithm and its implementation on FPGA”, 2014 International Conference on Control, Instrumentation, Energy & Communication(CIEC), Calcutta, India 2014.
9.       Tongqing Li et. al.,” The Real-Time R-wave Detection Based on FPGA”, 2014 7th International Conference on BioMedical Engineering and      Informatics (BMEI 2014), Dalian, China.
10.    Y. Liang et. al., “Field Programmable Gate Array Implementation  Method of Electrocardiogram Signal Processing and Analysis”, 2015 8th International Conference on BioMedical Engineering and Informatics (BMEI 2015), Shenyang, China.
11.    S. CHABCHOUB et. al.,” Biomedical monitoring system using LabVIEW FPGA”, 2015 World Congress on Information Technology and Computer Applications Congress (WCITCA), Hammamet, Tunisia.
12.    Mr. P.C.Bhaskar, and Mr.A.M. Kasture,” Minimization of Base-Line Drift Interference from ECG Signal Using FPGA Based Adaptive Filter”, 2015 International Conference on Computing Communication Control and Automation, Pune, India.
13.    Bhavtosh et. al.,” High performance QRS Complex Detector for Wearable ECG systems using Multi Scaled Product with Booth  Multiplier and Soft Threshold algorithm”, 2015 International Conference on Signal Processing and Communication (ICSC), Noida, India.
14.    Dheyaa Alhelal et. al., “FPGA-Based Denoising and Beat Detection of  the ECG Signal”, 2015 IEEE Long Island Systems, Applications and Technology Conference (LISAT), Farmingdale, NY, USA.
15.    N. A. Abdul-Kadir et. al., “DSP ASIC Module Design for Natural  Frequency of ECG Signal”, 2015 IEEE International Circuits and Systems Symposium(ICSyS), Langkawi, Malaysia.
16.    N. Abdullah, and B. H. Abd, “A Simple FPGA System for ECG R-R Interval Detection”, 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA), Hefei, China.
17.    R. Joaquinito, and H. Sarmento, “A Wireless Biosignal Measurement  System using a SoC FPGA and Bluetooth Low Energy”, 2016 International Conference on Consumer Electronics-Berlin.
18.    R. M. Y. Malkhasian,” PC-Based Multi-Channel ECG System”, M.Sc. thesis, University of Al-Nahrain, Iraq, 2005.
19.    L. Thulasimani and M. Dhivya, “Removal of Power-Line Interference from Biomedical Signal using using Notch Filter”, Australian Journal of Basic and Applied Sciences, Pages: 161-165, 9(15) Special 2015.
20.    Stouffer, “Practical ECG Interpretation Clues to Heart Disease in Young Adults”, O'Reily Media, 2009. 21.    T. L. Floyd, “Electronic Device”, Pearson Education, 2008.
22.    T. Luong et. al., “Removal of power line interference from  Electrocardiograph (ECG) using proposed adaptive filter,” Global Journal of Computer Science and Technology,
ISSN 0975-4172  (online), ISSN 0975-4350 (print), Vol.15-C,2015.
23.    D. A. Bell, “Operational amplifiers and linear ICs”, 2nd Edition, Oxford University Press, 1997.
24.    B. Evans, “Beginning Arduino Programming”, Apress, 2011.
25.    S. F. Barrett, “Arduino Microcontroller Processing for Everyone”, Morgan & Claypool, 2010.
26.    R. Faludi, “Building Wireless Sensor Networks”, O'Reilly Media, 2011.
27.    P. P. Chu, “FPGA Prototyping by VHDL Examples”, Wiley- Interscience, 2008.
28.    R. X. Stroobandt, S. S. Barold and A. F. Sinnaeve, “ECG from Basics to Essentials Step by Step”, John Wiley & Sons, 2016.





 M. Chitra, M. Revathi, J. Dharmaraja, S. Shobana, M. Anusuya

Paper Title:

Synthesis, Growth, Structural Elucidation and Pharmacological Activities of o–Aminobenzamide and L–Asparagine derived Ni(II), Cu(II) and Zn(II) Compounds

Abstract: The present study mainly investigates the synthesis and growth of some novel bioactive Ni(II), Cu(II) and Zn(II) compounds (1–3) derived from 2–aminobenzamide (o–aminobenzamide: 2AB: L) and L–asparagine (asn: B). The synthesised compounds were structurally characterized by various physico–chemical and spectral (FTIR, UV–vis., TGA/DTA, XRD and SEM) studies. The micro elemental (C, H and N) analysis suggests that stoichiometry of the metal(II) compounds to be 1:1:1 (Metal: 2AB: asn). The observed low molar conductance values reveal their non–electrolytic nature and the observed electronic spectra coupled with magnetic moment values clearly indicate that the ligands 2AB (L) and asn (B) coordinate with metal(II) ions in tetradentate manner through amino–N & amido–O of (L) and deprotonated carboxylato–O & amino–N atoms of (B) to form a stable 6, 5 membered chelate ring. Powder X–ray diffractogram and SEM pictograph implies that all the compounds have well–defined nanocrystallinity with homogeneous morphology. All the derived compounds (1–3) show significant in vitro biological and antioxidant activities than the 2AB(L) and asn(B) in their free state and the activities go behind the order as Control >> CuLB >> NiLB ≈ ZnLB > 2AB(L) > asn(B).

Keywords: 2–Aminobenzamide, L–Asparagine, Spectral, XRD, SEM, Pharmacological study.Abbreviations:

2AB (L) = 2–Aminobenzamide or o–Aminobenzamide;
Asn (B) = L–Asparagine, AA = Ascorbic acid,
DPPH = 2, 2–Diphenyl–1–picrylhydrazyl,
SEM = Scanning Electron Micrography


  1. Kraatz and N.M. Nolte, “Concepts and Models in Bioinorganic Chemistry”, Wiley, New York, 2006.
  2. V. Pillay, Modern Medical Toxicology, 4th ed., Jaypee Brothers Medical Publisher Pvt. Ltd., New Delhi, 2013.
  3. Stanley and J. Rotrosen, “The Benzamides Pharmacology, Neurobiology and Clinical Aspects”, Raven Press, New York, 1982.
  4. Xie, Y. Yao, P. Tang, G. Chen, X. Liu, F. Yun, C. Cheng, X. Wu and Q. Yuan, “Design, synthesis and biological evaluation of novel hydroxamates and 2–aminobenzamides as potent histone deacetylase inhibitors and antitumor agents”, Eur. J. Med. Chem., vol. 134, 2017, pp. 1–12.
  5. Li, X.M. Wang, J. Wang, T. Shao, Y.P. Li, Q.B. Mei, S.M. Lu and S.Q. Zhang, “Combination of 2–methoxy–3–phenylsulfonylaminobenzamide and 2–amino benzothiazole to discover novel anticancer agents”, Bioorg. Med. Chem., vol. 22, 2014, pp. 3739–3748.
  6. F. Xiang, C.W. Qian, G.W. Xing, J. Hao, M. Xia and Y.F. Wang, “Anti–herpes simplex virus efficacies of 2–aminobenzamide derivatives as novel HSP90 inhibitors”, Bioorg. Med. Chem. Lett., vol. 22(14), 2012, pp. 4703–4706.
  7. M. Wang, M.H. Xin, J. Xu, B.R. Kang, Y. Li, S.M. Lu and S.Q. Zhang, “Synthesis and antitumor activities evaluation of m–(4–morpholinoquinazolin–2–yl)benzamides in vitro and in vivo”, Eur. J. Med. Chem., vol. 96 , 2015, pp. 382–395.
  8. Park, B.M. Lee, K.H. Hyun, T. Han, D.H. Lee and H.H. Choi, “Design and Synthesis of Acetylenyl Benzamide Derivatives as Novel Glucokinase Activators for the Treatment of T2DM”, ACS Med. Chem. Lett., vol. 6(3), 2015, pp. 296–301.
  9. A. Shaaban, M.D. Shepherd, T.A. Ahmed, S.E. Nybo, M. Leggas and J. Rohr, “Pyramidamycins A–D and 3–hydroxyquinoline–2–carboxamide; cytotoxic benzamides from Streptomyces sp. DGC1”, J. Antibiot., (Tokyo), vol. 65(12), 2012, pp. 615–622.
  10. P. Kozak, C.B. Tortosa, D.L. Fernandes and D.I. Spencer, “Comparison of procainamide and 2–aminobenzamide labeling for profiling and identification of glycans by liquid chromatography with fluorescence detection coupled to electrospray ionization–mass spectrometry”, Anal. Biochem., vol. 486, 2015, pp. 38–40.
  11. Aminobenzaldehyde and Anthranilic Acids. In Techniques in Glycobiology”, R.R. Townsend, A.T. Hotchkiss, Jr., Eds.; Marcel Dekker: New York, 1997, pp. 59–375.
  12. Franz, M. Gmeiner, A. Gruner, D. Kemmer and F Welle, “Diffusion behaviour of the acetaldehyde scavenger 2–aminobenzamide in polyethylene terephthalate for beverage bottles”, Food Addit. Contam. Part A Chem. Anal. Control Expo. Risk Assess, vol. 33(2), 2016, pp. 364–372.
  13. M. Fevig, J. Cacciola, J. Jr. Buriak, K.A. Rossi, R.M. Knabb, J.M. Luettgen, P.C. Wong, S.A. Bai, R.R. Wexler and P.Y.S. Lam, “Preparation of 1–(4–methoxyphenyl)–1H–pyrazolo[4,3–d]pyrimidin–7(6H)–ones as potent, selective and bioavailable inhibitors of coagulation factor Xa”, Bioorg. Med. Chem. Lett., vol. 16(14), 2006, pp. 3755–3760.
  14. Bonnett, “Chemical Aspects of Photodynamic Therapy. In”: D. Phillips, P.P. O’Brien, S. Roberts, Eds., Gordon and Breach Science Publishers: Amsterdam, London, 2000.
  15. Sigel, “Metal Ions in Biological Systems”, M. Dekker, New York, 1971–1997, Vol. 1–37.
  16. M. Sydor and D.B. Zamble, “Nickel metallomics: general themes guiding nickel homeostasis”, Met. Ions Life Sci., vol. 12, 2013, pp. 375–416.
  17. Chaitow, “Amino Acids in Therapy: A Guide to the Therapeutic Application of Protein Constituents”, Healing Arts Press, Rochester, Vermont, 1985.
  18. Pisarewicz, D. Mora, F.C. Pfluegar, G.B. Fields and F. Mari, “Polypeptide chains containing D–gamma–hydroxyvaline”, J. Am. Chem. Soc., vol. 127(17), 2005, pp. 6207–6215.
  19. Wu, “Functional amino acids in growth, reproduction and health”, Adv. Nutr., vol. 1(1), 2010, pp. 31–37.
  20. Dharmaraja, P. Subbaraj, T. Esakkidurai and S. Shobana, “Studies on Ni(II), Cu(II) and Zn(II) complexes with 2–aminobenzamide and some bioactive imidazole enzyme constituents”, J. Coord. Chem., vol. 68(24), 2015, pp. 4314–4344.
  21. Dharmaraja, J. Balamurugan and S. Shobana, “Synthesis, structural elucidation, microbial, antioxidant and nuclease activities of some novel divalent M(II) complexes derived from 5–fluorouracil and l–tyrosine”, J. Saudi. Chem. Soc., vol. 21(Supplement 1), 2017, pp. S67–S76.
  22. Shobana, P. Subramaniam, J. Dharmaraja and S. Arvindnarayan, “Structural, morphological and biological investigations of some transition metal–5–Fluorouracil–amino acid mixed ligand complexes”, Inorg. Chim.Acta, vol. 435, 2015, pp. 244–261.
  23. D. Perrin, W.L.F. Armarego and D.R. Perrin, “Purification of Laboratory Chemicals”, Pergamo Press, Oxford, 1980.
  24. Earnshaw, “Introduction to Magneto Chemistry”, Academic Press, New York, 1968.
  25. E. Levinson and E. Jawetz, “Medical Microbiology and Immunology”, 4th ed., Appleton and Lange, 1996.
  26. S. Blois, “Antioxidant Determinations by the Use of a Stable Free Radical”, Nature, vol. 181, 1958, pp.1199–1200.
  27. J. Geary, "Use of Conductivity Measurements in Organic Solvents For The Characterization of Coordination Compounds", Coord. Chem. Rev., Vol.7, 1971, pp. 81–122.
  28. Nakamoto, “Infrared and Raman Spectra of Inorganic and Coordination Compound” 5th Ed., Part B, John Wiley and Sons, Inc., 1997.
  29. Dharmaraja, T. Esakkidurai, P. Subbaraj and S. Shobana, “Mixed ligand complex formation of 2–aminobenzamide with Cu(II) in the presence of some amino acids: synthesis, structural, biological, pH–metric, spectrophotometric and thermodynamic studies”, Spectrochimica Acta A Mol. Biomol. Spectrosc., vol. 114A, 2013, pp. 607–621.
  30. B.P. Lever, “Electronic spectra of dn ions in Inorganic Electronic Spectroscopy”, 2nd Ed., Elsevier, Amsterdam, The Netherlands, 1984.
  31. S.J. Lucia Rose, P. Selvarajan and S. Perumal, “Synthesis, growth and spectroscopic studies of L–Alanine hydrogen chloride (LAHC) crystals”, Rec. Res. Sci. Tech., vol. 2(3), 2010, pp. 76–79.
  32. Vasudevan, R. Ramesh Babu, A. Reicher Nelcy, G. Bhagavannarayana and K. Ramamurthi, “Synthesis, growth, optical, mechanical and electrical properties of L–lysine L–lysinium dichloride nitrate (L–LLDN) single crystal”, Bull. Mater. Sci., vol. 34(3), 2011, pp. 469–475.
  33. A. Estermann and W.I.F. David, “Structure determination from powder diffraction data (SDPD)”, W.I.F. David, K. Shankland, B. McCusker, Ch. Baerlocher (Eds.), Oxford Science Publications, New York, 2002.
  34. Guinier, “X–Ray diffraction In Crystals, Imperfect Crystals, and Amorphous Bodies”, W.H. Freeman & Company, San Francisco, USA, 1963.
  35. Anjaneyulu and R.P. Rao, “Preparation, characterization and antimicrobial activity studies on some ternary complexes of Cu(II) with acetylacetone and various salicylic acids”, Synth. React. Inorg. Met. Org. Chem., vol. 16(2) 1986, pp. 257–72.
  36. Tweedy, “Possible mechanism for reduction of elemental sulfur by monilinia fructicola’, Phytopathology., vol. 55, 1964, pp. 910–914.
  37. Reddy, “Bioinorganic Chemistry”, New Age International Pvt. Ltd, New Delhi, 2003.
  38. B. Bukhari, S. Memon, M. Mahroof–Tahir and M.I. Bhanger, “Synthesis, characterization and antioxidant activity copper–quercetin complex”, Spectrochim Acta A Mol Biomol Spectrosc., vol. 71(5), 2009 pp. 1901–06.
  39. J. Lakshmipraba, S. Arunachalam, R.V. Solomon and P. Venuvanalingam, “Synthesis, DNA binding and docking studies of copper(II) complexes containing modified phenanthroline ligands”, J. Coord. Chem., vol 68(8), 2015, pp. 1374–1386.





 Vikas Baisane, N. D. Kamble

Paper Title:

 Implementing A Hybrid Slicing Approach for Privacy Preserving Data Publishing

Abstract: Several techniques of anonymity, such as generalization and disruption, have been designed to protect privacy from the publication of micro-data. Recent work has shown that generalization loses much information, especially for high dimensional data. Bucketization, on the other hand, does not prevent the disclosure of membership and does not apply to data that do not have a clear separation between quasi-identifiable attributes and sensitive attributes. In this paper, we present a new technique called overlapping slice, which divides the data horizontally and vertically. We show that the overlap section preserves a better data utility than generalization and can be used for the protection of belonging to belonging. Another important advantage of the overlap slice is that it can handle large data storage.

Keywords: Privacy preservation, data anonymization, data publishing, data security.


  1. Tiancheng Li, Ninghui Li, Senior Member, IEEE, Jia Zhang, Member, IEEE, and Ian Molloy “Slicing: A New Approach for Privacy Preserving Data Publishing” Proc. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 3, MARCH 2012.
  2. Ciriani, S. De Capitani di Vimercati,S. Foresti, and P. Samarati On K-Anonymity. In Springer US, Advances in Information Security (2007).
  3. Latanya Sweeney. K-anonymity: “a model for protecting privacy”. International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5):557–570, 2002.
  4. Brickell and V. Shmatikov, “The Cost of Privacy: Destruction of Data-Mining Utility in Anonymized Data Publishing,” Proc. ACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining (KDD), pp. 70-78, 2008
  5. Benjamin C. M. Fung, Ke Wang, AdaWai-Chee Fu, and Philip S. Yu, “Privacy Preserving Data Publishing Concepts and Techniques” ,Data mining and knowledge discovery series (2010).
  6. Neha V. Mogre, Girish Agarwal, PragatiPatil: “A Review on Data Anonymization Technique For DataPublishing” Proc. International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 10, December-2012 ISSN: 2278-0181
  7. Li, T. Li, and S. Venkatasubramanian,“t-Closeness: Privacy Beyond k-Anonymity and ‘l-Diversity,”Proc. IEEE 23rd Int’l Conf. Data Eng. (ICDE), pp. 106-115, 2007.
  8. Machanavajjhala, D. Kifer, J. Gehrke,and M. Venkitasubramaniam. “l-diversity: Privacy beyond kanonymity”. InICDE, 2006.
  9. Martin, D. Kifer, A. Machanavajjhala,J. Gehrke, and J. Halpern. “Worst-case background knowledge for privacy-preserving data publishing”. In ICDE, 2007.
  10. Ghinita, Y. Tao, and P. Kalnis, “On the Anonymization of Sparse High-Dimensional Data,” Proc. IEEE 24th Int’lConf. Data Eng. (ICDE), pp. 715-724, 2008.
  11. J. Bayardo and R. Agrawal, “Data Privacy through Optimal k-Anonymization,”in Proc. of ICDE, 2005, pp. 217–228.
  12. LeFevre, D. J. DeWitt, and R.Ramakrishnan, “Incognito: Efficient Full-domain k-Anonymity,” in Proc. of ACM SIGMOD, 2005, pp. 49–60.
  13. LeFevre, D. J. DeWitt, and R.Ramakrishnan, “Mondrian Multidimensional k-Anonymity,” in Proc. of ICDE, 2006.
  14. Gabriel Ghinita, Member IEEE, PanosKalnis, Yufei Tao,” Anonymous Publication of Sensitive Transactional Data” in Proc. of IEEE Transactions on Knowledge and Data Engineering February 2011 (vol.23no. 2) pp. 161-174.
  15. D.J. Martin, D. Kifer, A. Machanavajjhala, J. Gehrke, and J.Y. Halpern, “Worst-Case Background Knowledge for Privacy-Preserving Data Publishing,” Proc. IEEE 23rd Int’l Conf. Data Eng. (ICDE), pp. 126-135, 2007