Enhanced Security for Two Party Confidential Data

Abstract

 Data mining is the process of extracting hidden predictive information from large databases to support decision making process. There may be a chance of revealing sensitive information stored in dataware house during extraction of hidden details. To protect this consequence a method is proposed to securely integrate person-specific sensitive data from two data providers, whereby the integrated data still retains the essential information for supporting data mining tasks. Most real-life scenarios are in need for simultaneous data sharing and privacy preservation of person sensitive data. Enhanced security for two party confidential data adopts differential privacy, provides a rigorous privacy model and makes no assumption about an adversary’s background knowledge. Two party algorithm is used in existing system for private data release for vertically-partitioned data between two parties in the semi-honest adversary model. A differentially-private mechanism is proposed to ensure that the probability of any output is equally likely from all nearly identical input data sets and thus guarantees that all outputs are insensitive to any individual’s data. Updating sensitivity scores is done to set scores for the sensitive details. Sha-2 algorithm is used for the purpose of user authentication to avoid masquerade attacks.

Authors and Affiliations

G. Sumathi*1

Keywords

Related Articles

 Assessment And Comparison of Thermal fatigue Failure For BS 3059 Boiler Tube

 This research highlights on the assessment of thermal fatigue failure for BS 3059/1087 Part 1 ERW 320 boiler tube using experimental procedure by using of smithy furnace and comparing with Coffin are highly affec...

ONTOLOGY BASED ASPECT LEVEL OPINION MINING

In recent years, opinion mining has been investigated mainly in three level of granularity (document, sentence or aspect(feature)). However both document and sentence level analysis do not discover what exactly customers...

 The Evaluation of a Performance Model for a MOST Network

 This paper presents a MOST network model that can support the network configurations and data transmission in the network is composed with various devices employing MOST bus. It is implemented high level descript...

 Isolated Word Recognition System for Autistic Speech

 This paper aims to discuss the implementation of an Isolated Word Recognition system for Autistic speech using Hidden Markov Model (HMM). This system will be able to recognize the spoken words of Autistic children...

 Cache Replication-An Efficient Cache Consistency Scheme for the Server Based Networks

 In most server-based schemes, server is not usually aware of what data items are currently cached, as they might have been replaced or deleted from the network due to node disconnections. In this method a cache c...

Download PDF file
  • EP ID EP158784
  • DOI -
  • Views 69
  • Downloads 0

How To Cite

G. Sumathi*1 (30).  Enhanced Security for Two Party Confidential Data. International Journal of Engineering Sciences & Research Technology, 3(5), 876-881. https://europub.co.uk/articles/-A-158784