Comparative Analysis of Privacy Preserving Techniques in Distributed Database

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 1

Abstract

In recent years, isolation takes an imperative role to secure the data from various probable attackers. For public advantage data need to be shared as required for Health care and researches, individual privacy is major concern with respect to sensitive information. For that anonymization of data with K-anonymity and L-diversity are studied. Existing system is depends on providers and is used generalization technique for anonymization. This will increase in data loss to avoid this slicing techniques are used. Data publishing is done in such a way that privacy of data should be preserved .While publishing collaborative data to multiple data provider’s two types of problem occurs, first is outsider attack and second is insider attack. Outsider attack is by the people who are not data providers and insider attack is by colluding data provider who may use their own data records to understand the data records shared by other data providers. The paper focuses on insider attack, and makes some contributions. This problem can be overcome by combining slicing techniques with m-privacy techniques and addition of protocols as secure multiparty computation and trusted third party will increase the privacy of system effectively.

Authors and Affiliations

Keywords

Related Articles

A Comparative Study of the AODV and DSDV Routing Protocols for Smaller Mobile Ad Hoc Networks

The aim of my research result is to study the performance of routing in Mobile Ad hoc Network, a network consists of individual nodes connecting with each other creating a network without using infrastructure. Routing in...

Characterization of Nanorods Obtained by Mixing 20%SnO2 + 80% In2O3 Thin Films Prepared by Sol-Gel Method

In this work a mixing SnO2and In2O3 precursors solutions were prepared by sol-gel method. About this mixture, thin films were elaborated by dip coating and were followed by annealing in air. Nanorods were obtained and we...

Security in Vehicular Ad Hoc Networks through Mix-Zones Based Privacy

Vehicular Networks (VNs) seek to provide, among other applications, safer driving conditions. Vehicles need to periodically broadcast safety messages providing precise position information to nearby vehicles. Recent adva...

Factors of Overweight and Obesity Related to Eating Habits and Physical Activity in Students of Azra Naheed Medical College

The prevalence of obesity and overweight is rising to alarming levels in developed and developing countries including Pakistan. The objective of study was to determine the factors responsible for overweight and obesity i...

Download PDF file
  • EP ID EP339576
  • DOI -
  • Views 82
  • Downloads 0

How To Cite

(2015). Comparative Analysis of Privacy Preserving Techniques in Distributed Database. International Journal of Science and Research (IJSR), 4(1), -. https://europub.co.uk/articles/-A-339576