Comparative Analysis of Privacy Preserving Techniques in Distributed Database

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 1

Abstract

In recent years, isolation takes an imperative role to secure the data from various probable attackers. For public advantage data need to be shared as required for Health care and researches, individual privacy is major concern with respect to sensitive information. For that anonymization of data with K-anonymity and L-diversity are studied. Existing system is depends on providers and is used generalization technique for anonymization. This will increase in data loss to avoid this slicing techniques are used. Data publishing is done in such a way that privacy of data should be preserved .While publishing collaborative data to multiple data provider’s two types of problem occurs, first is outsider attack and second is insider attack. Outsider attack is by the people who are not data providers and insider attack is by colluding data provider who may use their own data records to understand the data records shared by other data providers. The paper focuses on insider attack, and makes some contributions. This problem can be overcome by combining slicing techniques with m-privacy techniques and addition of protocols as secure multiparty computation and trusted third party will increase the privacy of system effectively.

Authors and Affiliations

Keywords

Related Articles

Survey on Different Data Hiding Methods For Binary Host Images

Data hiding approach aims to embed some secret information into a carrier data signal by altering the unimportant components for copyright protection or secret communication. In some cases, the data-hiding operation will...

Review of Active Reactive Power Flow Control using Static Synchronous Series Compensator (SSSC)

Review of Active Reactive Power Flow Control using Static Synchronous Series Compensator (SSSC)

Discrimination Prevention in Data mining with Privacy Preservation

Data mining is an important technology for extracting useful knowledge hidden in large collections of data. There are many positive aspects for data mining, but it also has some disadvantages which include potential disc...

Prevalence, Incidence and Distribution of Sweet Potato Virus: It’s Effect on the Yield of Sweet Potato in Southern Region of Ethiopia

Sweet potato virus disease (SPVD) is one of the major constraints of sweet potato production in east and central African. However the problem has not been reported in Ethiopia until recently. Even if the first introducti...

Combination of Plasma Ultra-Sensitive CRP and Homocysteine as Diagnostic and Predictive Protocol for Acute Myocardial Infarction

Objective: The aim of the present study was to provide us-CRP test together with homocysteine test as a protocol for emergency diagnosis for acute myocardial infarction (MI) comparing to cTnI and LDL-C. Materials and Met...

Download PDF file
  • EP ID EP339576
  • DOI -
  • Views 84
  • Downloads 0

How To Cite

(2015). Comparative Analysis of Privacy Preserving Techniques in Distributed Database. International Journal of Science and Research (IJSR), 4(1), -. https://europub.co.uk/articles/-A-339576