Enhanced Security for Two Party Confidential Data

Abstract

 Data mining is the process of extracting hidden predictive information from large databases to support decision making process. There may be a chance of revealing sensitive information stored in dataware house during extraction of hidden details. To protect this consequence a method is proposed to securely integrate person-specific sensitive data from two data providers, whereby the integrated data still retains the essential information for supporting data mining tasks. Most real-life scenarios are in need for simultaneous data sharing and privacy preservation of person sensitive data. Enhanced security for two party confidential data adopts differential privacy, provides a rigorous privacy model and makes no assumption about an adversary’s background knowledge. Two party algorithm is used in existing system for private data release for vertically-partitioned data between two parties in the semi-honest adversary model. A differentially-private mechanism is proposed to ensure that the probability of any output is equally likely from all nearly identical input data sets and thus guarantees that all outputs are insensitive to any individual’s data. Updating sensitivity scores is done to set scores for the sensitive details. Sha-2 algorithm is used for the purpose of user authentication to avoid masquerade attacks.

Authors and Affiliations

G. Sumathi*1

Keywords

Related Articles

 Implementation of AOMDV, OLSR & ZRP Protocol for Analysis of Performance Matrices in VANET Scenario

 Vehicular Ad-Hoc Network (VANET) is a wireless technology which is the sub class of the Mobile Ad-Hoc Networks (MANET). In our work we are trying to provide connectivity to vehicles for enabling Intelligent Trans...

 DESIGN AND IMPLEMENTATION OF ELECTROCARDIOGRAM (ECG) SIGNAL GENERATOR BASED ON FPGA

 This paper offers a hardware design to produce a programmable ECG-channels signal generator using only a Field Programmable Gate Array (FPGA) and a small number of passive external components. The FPGA is used to...

 ALLOCATION OF SUBSCIBER NUMBERS FOR TELECOMMUNICATION USING INFORMIX-4GL

 The paper aims at creating an application for allocating numbers for a telecom company. The service provider gets the prefix from a regulatory body like TRAI. Based on that prefix the service provider has to gener...

 A Novel Method of Optimizing Lifetime and Reduction in Power Consumption in Wireless Sensor Network

 Optimal power flow (OPF) problem has already been attempted as a static, optimization problem by adopting gradient based methods and more recently, no conventional ones, such as evolutionary algorithms. However,...

 A Methodology for the Exploration

 Unified peer-to-peer technology have led to many typical advances, including write checking. After years of confusing research into S position paper we concentrate our efforts on arguing that the little IPv6 by...

Download PDF file
  • EP ID EP158784
  • DOI -
  • Views 57
  • Downloads 0

How To Cite

G. Sumathi*1 (30).  Enhanced Security for Two Party Confidential Data. International Journal of Engineering Sciences & Research Technology, 3(5), 876-881. https://europub.co.uk/articles/-A-158784