Enhanced Security for Two Party Confidential Data

Abstract

 Data mining is the process of extracting hidden predictive information from large databases to support decision making process. There may be a chance of revealing sensitive information stored in dataware house during extraction of hidden details. To protect this consequence a method is proposed to securely integrate person-specific sensitive data from two data providers, whereby the integrated data still retains the essential information for supporting data mining tasks. Most real-life scenarios are in need for simultaneous data sharing and privacy preservation of person sensitive data. Enhanced security for two party confidential data adopts differential privacy, provides a rigorous privacy model and makes no assumption about an adversary’s background knowledge. Two party algorithm is used in existing system for private data release for vertically-partitioned data between two parties in the semi-honest adversary model. A differentially-private mechanism is proposed to ensure that the probability of any output is equally likely from all nearly identical input data sets and thus guarantees that all outputs are insensitive to any individual’s data. Updating sensitivity scores is done to set scores for the sensitive details. Sha-2 algorithm is used for the purpose of user authentication to avoid masquerade attacks.

Authors and Affiliations

G. Sumathi*1

Keywords

Related Articles

 Commercial Passenger Vehicle Seat Design and Testing Using Advance Simulation Procedure

 Advanced manufacturing engineering is an approach to build an object with the inclusion of all technical aspects including durability as well as safety. In automobile manufacturing approach,It can be a great oppor...

 A New Hybrid Algorithm for Privacy Preserving Data Mining

 The collection of digital information by governments, corporations, and individuals has created tremendous opportunities for knowledge- and information-based decision making. Driven by mutual benefits, or by regul...

 Mathematical Modeling of Integrated Manufacturing And Distribution Systems With Fuzzy Approach in Supply Chain Management in the Food Industry

 Today, the role of the economy in various spheres among food is on the rise. Fuzzy supply chain management is one of the modern attitudes that lead to reduce system costs, food spoilage, losses in shipping product...

 MEASUREMENT OF INTERNAL CONVERSION COEFFICIENT Of 280kev γ – RAYS IN 203Hg

 The measurement of the internal conversion coefficient of 280keV γ – ray in 203HG have been investigated by means of calibrated 2ʺ x 2ʺ NaI(Tl)(scintillation detector which is sodium iodide activated with smal...

 MEASURING AND MODELING ACTIVITY COEFFICIENTS AND OSMOTIC COEFFICIENTS IN AQUEOUS AMINO-ACID SOLUTIONS

 The perturbed-chain statistical association theory (PC-SAFT) is applied to simultaneously describe various thermodynamic properties (density, vapor-pressure depression, activity coefficient, solubility) of aqueous...

Download PDF file
  • EP ID EP158784
  • DOI -
  • Views 76
  • Downloads 0

How To Cite

G. Sumathi*1 (30).  Enhanced Security for Two Party Confidential Data. International Journal of Engineering Sciences & Research Technology, 3(5), 876-881. https://europub.co.uk/articles/-A-158784