An Algorithm Of Anonymous Id Assignment For Secure Data Sharing On A Network

Abstract

Existing and new algorithms for assigning anonymous IDs are scrutinized with respect to tradeoffs among communication and computational requirements. An algorithm for distributed solution of certain polynomials over limited fields improves the scalability of the algorithms. Another form of anonymity as used in secure multiparty computation allows multiple parties on a network to together carry out a global computation that depends on data from each party while the data supposed by each party remains unknown to the other parties. The new algorithms are constructed on top of a secure sum data mining operation using Newton’s identities and Sturm’s theorem. An algorithm for distributed solution of convinced polynomials over limited fields improves the scalability of the algorithms. Markov chain representations are used to find statistics on the number of iterations required and computer algebra gives closed form results for the completion rates.

Authors and Affiliations

Morampudi Satya Harish| Department of Computer Science And Engineering, Akula Sree Ramulu institute of Engineering and Technology, prathipadu,Tadepalligudem,A.P,India, msatyaharish3@gmail.com, Dr A. Rama Murthy| Department of Computer Science And Engineering, Akula Sree Ramulu institute of Engineering and Technology, prathipadu,Tadepalligudem,A.P,India, ram111_sai@yahoo.com, K. T. V Subbarao| Department of Computer Science And Engineering, Akula Sree Ramulu institute of Engineering and Technology, prathipadu,Tadepalligudem,A.P,India, ogidi@rediffmail.com

Keywords

Related Articles

Keyword based pursuit in content rich multidimensional datasets encourages numerous novel applications and instruments. In this we consider objects that are tagged with watchwords and are inserted in a vector space. F...

Harmonics Reduction of a Single Phase Half Bridge Inverter

This paper displays a way to deal with minimize the sounds contained in the output of a solitary stage half scaffold inverter. With a perspective to decreasing Harmonic a LC low pass filter is utilized which hinders...

An Energy Based Fuzzy Logic Dc-Link Voltage Controller For Three Phase DSTATCOM To Compensate AC Loads

it is very important to compensate the transient response of DSTATCOM for unbalanced and nonlinear loads. Majorly the dc link voltage will be varied, when any small change in the load side. The proper operation of DS...

Spoofing Attacks on Packets And Methods For Detection And Prevention Of Spoofed Packets

In a spoofing attack, the attacker creates misleading context in order to trick the victim into making an inappropriate security-relevant decision. A spoofing attack is like a con game: the attacker sets up a false bu...

Genetically Optimized Pre coders Transceiver Design for Double STBC System

Wireless communications depends on multiple-inputmultiple-output (MIMO) techniques for high data rates. Feedback of channel information can be used in precoding to use the strongest channel mode and improve MIMO perfor...

Download PDF file
  • EP ID EP16421
  • DOI -
  • Views 359
  • Downloads 14

How To Cite

Morampudi Satya Harish, Dr A. Rama Murthy, K. T. V Subbarao (2014). An Algorithm Of Anonymous Id Assignment For Secure Data Sharing On A Network. International Journal of Science Engineering and Advance Technology, 2(12), 953-955. https://europub.co.uk/articles/-A-16421