Comparative Analysis of Privacy Preserving Techniques in Distributed Database

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 1

Abstract

In recent years, isolation takes an imperative role to secure the data from various probable attackers. For public advantage data need to be shared as required for Health care and researches, individual privacy is major concern with respect to sensitive information. For that anonymization of data with K-anonymity and L-diversity are studied. Existing system is depends on providers and is used generalization technique for anonymization. This will increase in data loss to avoid this slicing techniques are used. Data publishing is done in such a way that privacy of data should be preserved .While publishing collaborative data to multiple data provider’s two types of problem occurs, first is outsider attack and second is insider attack. Outsider attack is by the people who are not data providers and insider attack is by colluding data provider who may use their own data records to understand the data records shared by other data providers. The paper focuses on insider attack, and makes some contributions. This problem can be overcome by combining slicing techniques with m-privacy techniques and addition of protocols as secure multiparty computation and trusted third party will increase the privacy of system effectively.

Authors and Affiliations

Keywords

Related Articles

Optimistic Analysis of Processor Using FFT Equation Execution

This paper optimistic analysis of processor using Fast Fourier Transformation equation performed. Now a day’s most desktop PCs have multiprocessing technology such as Hyper-Threading (HT), Dual-Core, and Quad-Core proces...

Hybrid Classifiers for Gender Driven Emotion Recognition

Recognizing human emotions by registering speech signals is always an interesting field in Artificial Intelligence. This paper describes a system which makes 1] gender recognition first, to get apriori knowledge about th...

Survey on Security Challenge for Data forwarding in Cloud

Cloud Computing emerged as the next-generation architecture of IT Enterprise. As high speed network or Internet access become available to users, so user can easily use many services through Internet from anywhere at any...

Parallel Generators of Pseudo-random Numbers with Control of Calculation Errors

Algorithms of parallel realization of classical "congruent" methods of generation of pseudo-random numbers are discussed. Algebraic (equational) and matrix interpretations of ways of realization of algorithms are present...

Studies of Ethnomedicinal Plants used by Tribals in Some Selected Villages of Nimar Region (M.P.)

The present paper deals with the traditional knowledge of traditional herbal healers of East Nimar (Khandwa) and West Nimar (Khargone) district of Madhya Pradesh. The traditional knowledge of medicinal plants used by tri...

Download PDF file
  • EP ID EP339576
  • DOI -
  • Views 73
  • Downloads 0

How To Cite

(2015). Comparative Analysis of Privacy Preserving Techniques in Distributed Database. International Journal of Science and Research (IJSR), 4(1), -. https://europub.co.uk/articles/-A-339576