Privacy-Preserving Updates to Databases with Security
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 1
Abstract
Today’s databases speak to a critical stake for numerous requisitions. There is an expanded concern for security. The accessibility of tremendous amounts of databases recording an extensive assortment of data about people makes it conceivable by essentially corresponding all the accessible databases. Likewise, delicate data about the gathering embeddings the information may be spilled from the right to gain entrance control approaches received by the anonymous database framework. A methodology could be utilized is dependent upon methods for client anonymous authentication and qualification check. So the issue of anonymous updates to confidential databases is unpredictable and requires the combo of some systems. Some protocol and systems have been proposed in the literature, which manage the anonymity, confidentiality and privacy. Still a few issues are unaddressed like n-anonymity, malicious third party and efficiency improvement of protocol. In this, three protocols that is Formation 1 protocol, Formation 2 protocol and third party protocol are proposed to deal with above issues.
Authors and Affiliations
Pallavi S. Patil, Prof. K. B. Manwade, Prof. G. A. Patil
Intelligent Traffic Light Control with Wireless Sensor Networks
In this paper, the design of a system that utilizes and efficiently manages traffic light controllers is presented. The main motto is the real-time adaptive control of the traffic lights. The existing methods for traffic...
Fire Alarm System Through Smoke Detection
A reliable fire alarm system (FAS) is crucial for timely reporting and responding to fires. While existing techniques can predict undesirable outcomes, they lack guidance on when and how workers should intervene to minim...
Solar Mobile Charger
Vedic literatures in India even state the use of flying machines which were powered using the sun. Coming 21st century, we have come a long way in developing solar cells which are the devices powering our future, convert...
Analysis of Face Recognition Methods
Face recognition has emerged as a promising field in computer-based applications in recent years, owing to the wide range of applications that it has found in a variety of fields. Due to the obvious wide variety of varia...
VANET-OLSR Cooperative Cross-Layer Detection for Black hole Attacks
In this study, we address the issue of detecting hot spot problem targeting Multi Point Relays (MPRs) using Vehicular Ad hoc channels Reactive Routing protocol (VANET-OLSR). To identify network-related threats, a watchdo...