Enhanced Security for Two Party Confidential Data
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 5
Abstract
Data mining is the process of extracting hidden predictive information from large databases to support decision making process. There may be a chance of revealing sensitive information stored in dataware house during extraction of hidden details. To protect this consequence a method is proposed to securely integrate person-specific sensitive data from two data providers, whereby the integrated data still retains the essential information for supporting data mining tasks. Most real-life scenarios are in need for simultaneous data sharing and privacy preservation of person sensitive data. Enhanced security for two party confidential data adopts differential privacy, provides a rigorous privacy model and makes no assumption about an adversary’s background knowledge. Two party algorithm is used in existing system for private data release for vertically-partitioned data between two parties in the semi-honest adversary model. A differentially-private mechanism is proposed to ensure that the probability of any output is equally likely from all nearly identical input data sets and thus guarantees that all outputs are insensitive to any individual’s data. Updating sensitivity scores is done to set scores for the sensitive details. Sha-2 algorithm is used for the purpose of user authentication to avoid masquerade attacks.
Authors and Affiliations
G. Sumathi*1
Assessment And Comparison of Thermal fatigue Failure For BS 3059 Boiler Tube
This research highlights on the assessment of thermal fatigue failure for BS 3059/1087 Part 1 ERW 320 boiler tube using experimental procedure by using of smithy furnace and comparing with Coffin are highly affec...
ONTOLOGY BASED ASPECT LEVEL OPINION MINING
In recent years, opinion mining has been investigated mainly in three level of granularity (document, sentence or aspect(feature)). However both document and sentence level analysis do not discover what exactly customers...
The Evaluation of a Performance Model for a MOST Network
This paper presents a MOST network model that can support the network configurations and data transmission in the network is composed with various devices employing MOST bus. It is implemented high level descript...
Isolated Word Recognition System for Autistic Speech
This paper aims to discuss the implementation of an Isolated Word Recognition system for Autistic speech using Hidden Markov Model (HMM). This system will be able to recognize the spoken words of Autistic children...
Cache Replication-An Efficient Cache Consistency Scheme for the Server Based Networks
In most server-based schemes, server is not usually aware of what data items are currently cached, as they might have been replaced or deleted from the network due to node disconnections. In this method a cache c...