Privacy-Preserving Updates to Databases with Security
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 1
Abstract
Today’s databases speak to a critical stake for numerous requisitions. There is an expanded concern for security. The accessibility of tremendous amounts of databases recording an extensive assortment of data about people makes it conceivable by essentially corresponding all the accessible databases. Likewise, delicate data about the gathering embeddings the information may be spilled from the right to gain entrance control approaches received by the anonymous database framework. A methodology could be utilized is dependent upon methods for client anonymous authentication and qualification check. So the issue of anonymous updates to confidential databases is unpredictable and requires the combo of some systems. Some protocol and systems have been proposed in the literature, which manage the anonymity, confidentiality and privacy. Still a few issues are unaddressed like n-anonymity, malicious third party and efficiency improvement of protocol. In this, three protocols that is Formation 1 protocol, Formation 2 protocol and third party protocol are proposed to deal with above issues.
Authors and Affiliations
Pallavi S. Patil, Prof. K. B. Manwade, Prof. G. A. Patil
Approaches of Data Warehousing and Their Applications: A Review
A data warehouse, DW in short is a huge repository of corporate data that is employed to aid an organization's decision-making. The data warehouse idea has been around throughout eighties, while it was created to assist...
Stresses Determination Method in Moving Parts of the Marine Engines
The moving parts of internal-combustion engines endures the highest and the most complex stresses. The tensile compression, bending and twisting stresses appear under the action of gas pressure forces and inertic forces...
IoT Based Intelligent Traffic Management and Violators Recognition System
This paper presents a new system to manage traffic in a high congested area. The IoT technology is utilized for traffic management and identification of defaulters. The raspberry-pi, RFID, and IR sensors are used to impl...
Educational Data Mining and Data Warehouse Design Using Business Intelligence
Business intelligence (BI) is basically a collection of programs, utilities and apps that allows you to analyze large quantities of data (Big Data). Every year, educational institutions deal with enormous amounts of Big...
Comparison of Image Compression Techniques: Huffman and DCT
The need for an efficient technique for compression of Images is ever increasing because the raw images need large amounts of disk space seems to be a big disadvantage during transmission and storage. Image compression i...