Analysis of Data and Traffic Management during Privacy Preservation in Secure Multiparty Computation

Abstract

-A protocol is secure if th e parties who want to compute their inputs hands it to the trusted parties. Trusted parties in turn compute th e inputs using the function f and give the re sult t o the respec tive parties af ter computation in such a way t hat n o part y can ident ify o ther’s part y data. During computation of inputs, we had considered the factor, what if trusted third parties are malicious? C onsidering different probabilities for the malicious users, we have tried to find out the correctness of the result and percentage of system acceptability. We then tried to increase the number of TTP’s in order to get the accurac y of t he result . The ai m of our proposed work is to identif y what probability of mali cious users will lead to the system in an unacceptable state. In this paper, we also propose the methodology and design an algorithm to c ontrol con gestion during Secure Multiparty Computation (SMC). As per our literature serve a lot of work has been done in SMC but th ey have worked only the main part of the SMC, privacy and correctness. Congestion control is one of the important components for the performance of the network and also is the most challenging one. In our previous research we assumed that the communication between party and a nonymizer i s s ecure, but if a ny anon ymizer become s malicious then entire data of one party can be hacked. In this protocol, to maintain the security betw een party and anonymizer we have partitioned the data in number o f packets befo re sendin g to a nonymizer. W e propo se th e framework in the form of a protocol f or s ecure multi-party computation. This protocol maintains t he se curity w hen we transfer the data between party and anonymizer. This paper deals with the way of shaping the traffic to improve quality of service (QoS) i n SMC. Si nce on increasing t he number o f packets there may be a problem of congest ion and under th e congestion situation, the queue length may become very large in a short time, resulting in buffer overf low and packet loss. So congestion control is necessary to ensure that users get the negotiated Qo S. Th e objectives of traffic c ontrol an d congestion control f or S MC are: Support a set of QoS parameters and minimize network and end-system complexity while maximizing network utilization. In our paper we also carried out experiment s for computing the FI FO l ength that e nsures z ero pa cket loss f or di fferent clock rate of the router.

Authors and Affiliations

Zulfa Shaikh , Tonu Sojatia , Mrs Pushpa Pathak , Mrs Shilpa Bhalerao

Keywords

Related Articles

Combined Text Watermarking

There is a vast amount of digital text data exchanged over the internet for the past few years. Such exchanges necessitate a very robust copyright protection mechanism. This paper presents a new idea on how one can effec...

 Web Services Security Architectures using RoleBased Access Control 

The Web Services Access controls are categorized according to access control granularity and have two approaches: The first approach supports a negotiation-based attribute-based access control to Web Servi...

A NOVEL APPROACH FOR RETRIEVING AN IMAGE USING CBIR

In this paper we mainly focussed on how to retreive the images from large database. Generally in huge databases we will have large number of images with the same name. when we want to retrieve the image by giving a name,...

Use of Local Minimization for Lossless Gray Image Compression 

A novel approach for the lossless compression of gray images is presented. A prediction process is performed followed by the mapping of prediction residuals. The prediction residuals are then split into bi...

DEVELOPMENT AND VALIDATION OF MEANINGFUL HYBRID E-TRAINING MODEL FOR COMPUTER EDUCATION

Meaningful hybrid e-training experience provides a coherent purpose for strategic educational change through lifelong education and the creation of a knowledge society. A close examination of new hybrid e-training progr...

Download PDF file
  • EP ID EP144888
  • DOI -
  • Views 174
  • Downloads 0

How To Cite

Zulfa Shaikh, Tonu Sojatia, Mrs Pushpa Pathak, Mrs Shilpa Bhalerao (2010). Analysis of Data and Traffic Management during Privacy Preservation in Secure Multiparty Computation. International Journal of Computer Science and Information Technologies, 1(1), 1-5. https://europub.co.uk/articles/-A-144888