SlideShare a Scribd company logo
1 of 6
Download to read offline
Neha Gosai, S.H.Patil / International Journal of Engineering Research and Applications
                        (IJERA) ISSN: 2248-9622 www.ijera.com
                         Vol. 2, Issue 4, July-August 2012, pp.856-861
        Privacy Conserving Approach to Confidential Database
                                       Neha Gosai*,S.H.Patil**
       *Department of Computer engineering, Bharati Vidyapeeth University,Pune, Maharashtra-411043
      **Department of Computer engineering, Bharati Vidyapeeth University,Pune, Maharashtra-411043


ABSTRACT
         Suppose Bank has private data of each           remove personal identifier to protect private
account holder which contains account number,            information. There are many ways of anonymization
details of account hoder.Now bank wants to share         but we will focus on k-anonymization approach
data with researchers for some specific purpose          only.
in such a way that privacy of individual account                  Data anonymization enables transferring
holder not violated by disclosing his data to            information between two organizations, by
researchers. If allow account holder to directly         converting text data into non human readable form
add data into the database of researcher it will         using encryption method[1].There have been lots of
violate confidentiality of research database and if      techniques developed.K-anonymization is one of the
allow researchers to directly read the contents,         approach[2].his technique protects privacy of
violates privacy of account holder. To preserve          original data by modification. So problem arises at
privacy and confidentiality we have proposed             this point where database needs to be updated. So
approach on suppression based k-anonymous                when tuple is to be inserted in the database problems
method to protect privacy of individual.                 occurs relating to privacy and confidentiality that Is
                                                         database owner decide that whether database
Keywords- Privacy, Anonymous, Suppression,               preserve privacy without knowing what new tuple to
Confidentiality                                          be inserted. In this paper, we propose a protocol
                                                         called Suppression based approach to solve above
1. INTRODUCTION                                          problem.
          Today society is growing in terms of data
collection, containing personal details or some other
confidential information. Because, use of computers
increasing, its privacy or security becomes crucial.
Database modelled as collection of data that can be
accessed, updated and it enables user to retrieve
data. To provide security to these databases is big
issue. For example, Medical data of each patient
should be protected for years. There are different
approaches to protect database. The emphasis in
database privacy should fall on a balance between
confidentiality, integrity and availability of personal                Fig 1 Anonymous Database
data, rather than on confidentiality alone. Database               Fig 1 shows approach to update anonymous
privacy concerns the protection of information about     database. Suppose Alice is user who owns the
individuals that is stored in a database. Sometimes,     database and data provider that is Bob who wants to
without your knowledge, health records used by           insert his own tuple.So it is necessary to check
insurance      companies,     drug      manufacturing    whether it is possible to update database or inserting
companies. Because medical records may contain           tuple without knowledge of Bob so that privacy of
some sensitive information like effect of drug on        Bob cannot be violated and confidentiality of
patient it is important to keep this information         database does not violated if Bob have access to the
private. Confidential data is personal information       contents of database.
relating to a person, it could be reference to an
identification number or other factors like social       2. PROBLEMS              WITH           CURRENT
identity. To maintain confidentiality, unauthorized      APPROACH
third parties must be prevented from accessing and                There are various techniques to provide
viewing medical data. It is also essential to maintain   confidentiality and privacy to anonymous database
database integrity while data is transferring from       like Data Reduction, Data perturbation and Secure
source to destination. Confidentiality is achieved by    Multiparty Computation etc.
Cryptography methods or tools. Though data is                     The first approach is Data perturbation
anonymized,              Confidentiality            is   technique derived from secure database techniques
necessary.Anonymized or anonymization means              to overcome privacy preserving problem. It is
                                                         effective application to protect health care system.
                                                                                                856 | P a g e
Neha Gosai, S.H.Patil / International Journal of Engineering Research and Applications
                        (IJERA) ISSN: 2248-9622 www.ijera.com
                         Vol. 2, Issue 4, July-August 2012, pp.856-861
Basically there are two types of data perturbation.      content of tuple and without sending tuple to owner
First type Probability distribution approach and the     [11].To achieve this goal two party exchange
second type are called the value distortion approach.    message by encrypting. Or say by anonymous
In the probability distribution, Original database is    connection using protocol like Crowds [12].Crowd
replaced by sample from distribution or by               protocol is anonymity protocol which hides each
distribution itself [4] and the value distortion         user‟s communication by routing them randomly
approach perturbs data elements or attributes directly   within group of similar users. This is necessary
by either additive noise, multiplicative noise, or       because attacker can easily reveal IP address and get
some other randomization procedures [5]. Agrawal         sensitive information. It can be leaked from access
et al. [6] proposed a value distortion technique to      control policies, so it is necessary to provide
protect the privacy by adding random noise from a        authorization so that only authorized party can
Gaussian distribution to the actual data. They           access data. This is based on user anonymous
showed that this technique appears to mask the data      authentication [13].Our problem is to privately
while allowing extraction of certain patterns like the   updates of anonymous and confidential databases.
original data distribution and decision tree models      3.1 Prototype Architecture
with good accuracy.
          Second research approach is Secure
Multiparty Computation method consider problem
of evaluating function of two or more parties‟ secret
input in such a way that each party does not get
anything else except specified output. Secure
computation was formally introduced in 1982 by A.
Yao This concept is important in field of
cryptography. For example two parties having some
secret information-𝑎 and 𝑏 respectively. They
compute joint function 𝑓 𝑎, 𝑏 without disclosing
information about 𝑎 and 𝑏 .Main aim of using SCM
is to allow maximum use of information without
compromising         user       privacy      .However,
computational complexity makes this approach
                                                                       Fig 2 Proposed System
infeasible for large dataset. There are different tool
available for large dataset [8].
                                                                  In fig 2 There are different modules
          The third approach is private data retrieval
                                                         shown:Cryptographic                  Module,Private
related to SMC. It focuses on Queries for retrieving
                                                         Checker,Loader Module.Job of cryptographic
data from database. But still it doesn‟t concern with
                                                         module is to encrypt all tuples between Data
privately updating database. Other techniques have
                                                         Provider and Private checker.Loader module read
been developed that is data anonymization, which
                                                         and transfer tuple from Anonymous database.
protects data through suppression or perturbation in
                                                         Private checker module performs all the controls that
stastical database. Sweeny who proposed concept of
                                                         is it checks whether the inserted data is matched
k-anonymity[9].But after researching on algorithm
                                                         with the data‟s in the anonymous database using
result comes out that it still not resolves problem of
                                                         suppression method. The main concept behind
privately update of database.
                                                         private checker is to check whether insertion is
          The fourth approach is Query Processing
                                                         possible into the k anonymous database.
Techniques for encrypted data [10].These approach
provide whole data to client, though it encrypts all
                                                         3.2 Suppression Based        Method     to   Update
data. But this is not concern to our approach. Most
                                                         Confidential Databases
of privacy models developed are based on k-
anonymity property-anonymity property deals the
                                                                   Consider Table T ={t1,…,tn} over the
possibility of indirect identification of records form
                                                         attribute set A. The idea of this algorithm is mask
public databases-anonymity means each released
                                                         some attributes by special value *,the value
record has at least (k-1) other records in the release
                                                         employed by Alice for the anonymization.
whose values are indistinct[15]. K-anonymity and
SMC are used in privacy-preserving data mining, but
they are quite different in terms of efficiency,
accuracy.

3. PROPOSED PROTOCOL
       The protocol Suppression based method for
anonymous database allows the owner of database
DB to anonymize tuple t, without knowledge of
                                                                                               857 | P a g e
Neha Gosai, S.H.Patil / International Journal of Engineering Research and Applications
                        (IJERA) ISSN: 2248-9622 www.ijera.com
                         Vol. 2, Issue 4, July-August 2012, pp.856-861
             Table 1 Original Dataset                 updating, and an approach that can be used is based
     AREA            POSITION          SALARY         on techniques for user anonymous authentication
Networking         Professor         12,000           and credential verification.
Networking         Professor         20,000
Programming        Professor         25,000                     The Diffie Hellman key exchange
Language                                              algorithm allows two users to establish shared secret
Programming        Professor         20,000           key over insecure communication without having
Language                                              any prior knowledge. Here, Diffie Hellmen is used
Database System Assistant            50,000           to agree on shared secret key to exchange data
Database System Assistant            40,000           between two parties. Here, we have assumed that
                                                      database is k-anonymous. So it needs to check that
          Table 2 Suppressed Data with k =2           after inserting properly anonymized tuple, by Bob,
      AREA              POSITION        SALARY        whether database (Alice) maintains its k-anonymity.
                                                      If this is the case, tuple can be inserted otherwise
         *                   *              *
                                                      tuple will be rejected.AES (Advance Encryption
         *                   *              *
                                                      Scheme) is symmetric key algorithm, means same
Programming              Professor          *
                                                      key used for encryption and decryption, for
Language
                                                      encryption of data.
Programming              Professor          *
Language
                                                      4. ALGORITHM
         *                   *              *
                                                                In suppression based method of anonymous
         *                   *              *         database, our main aim to compute anonymized
In suppression based method, Every attribute is       version of tuple t without letting Alice and Bob
suppressed by *.So third party cannot differentiate   know about the contents of tuple t and what are the
between any tuples. Table 2 shows Suppressed          suppressed attributes in tuple t. Suppose, Alice and
attributes or data with k= 2.Here,k=2 indicates k-    Bob agree on the commutative and product
anonymity that is each row in the table cannot be     homomorphic encryption scheme. Steps are
distinguished from at least other k-1 rows by only    described as below:
looking a set of attributes[9].                       1) Alice encrypts tuples with her private key and
3.3       Cryptography Assumption                     sends it to Bob.
          Suppression based k-anonymity protocol      2) Upon receiving encrypted version of tuple Bob
uses encryption scheme of commutative and product     it again encrypts tuple with his key send it to Alice.
homomorphic. This encryption scheme allows            3) Alice decrypts values to get Bob‟s key.
performing mathematical operation over encrypted      4) Alice examines if the suppressed attributes of
data. We provide definition of Commutativity,         tuple is equal to the tuple sent by Bob. If yes then
product homomorphic and indistiguishability [14].     insert tuple in database.
Given a finite set 𝐾 of keys and a finite domain, a
commutative, product homomorphic encryption           4.1 Implementation
scheme E is a polynomial time computable function              Suppression based k-anonymity approach
 𝐸: 𝐾 × 𝐷 → 𝐷 satisfying the following properties:    to provide privacy updates to confidential database
                                                      is designed by using Java. The implementation setup
1) Commutativity: For all key pairs 𝑘1, 𝑘2 ∈ 𝐾 and    Considered attributes AREA, POSITION and
value 𝑑 ∈ 𝐷,the following equality holds:             SALARY. We have considered POSITION as non
           𝐸𝑘1 𝐸𝑘2 𝑑 = 𝐸𝑘2(𝐸𝑘1(𝑑))                    suppressed attribute. Figure 2 shows home page of
2)       Product Homomorphism: For every 𝑘 ∈ 𝐾        Suppression based approach. Data entered by the
and every value pairs 𝑑1, 𝑑2 ∈ 𝐷 ,the following       user directly replaced by special value „*‟ and these
equality holds:                                       values being inserted into table. To carry out this
                                                      task, we have made separate table for original
          𝐸𝑘 𝑑1 ∙ 𝐸𝑘 𝑑2 = 𝐸𝑘(𝑑1 ∙ 𝑑2)                 values. When user enters data it checks value in
                                                      original table if it is valid then it replaces original
3)      Indistinguishability: It is infeasible to     value with suppressed values. Based on this outcome
obtain data of plaintext from cipher text. The        data will get inserted or rejected as shown in
advantages are high privacy of data even after        snapshot below.




                                                                                             858 | P a g e
Neha Gosai, S.H.Patil / International Journal of Engineering Research and Applications
                    (IJERA) ISSN: 2248-9622 www.ijera.com
                     Vol. 2, Issue 4, July-August 2012, pp.856-861




                          Fig 3 Attributes with wrong data value




                         Fig 4 Output screen of wrong data values




                                                                             859 | P a g e
Neha Gosai, S.H.Patil / International Journal of Engineering Research and Applications
                          (IJERA) ISSN: 2248-9622 www.ijera.com
                           Vol. 2, Issue 4, July-August 2012, pp.856-861




                                      Fig 5 Attributes with correct Values




                                      Fig 6 Output screen of correct values

4.2      Result
         From the implementation, we can say that
the complexity of protocol depends on number of
message exchanged and their size. The complexity of
protocol depends on the size of T. We have used java
as front end and My SQL for database. Experiment
executed on Pentium 1GHz with 1 GB physical
memory. We can make result that if all values
entered by data provider is correct then database will
be updated successfully otherwise tuple will not be
inserted to the database. Thus we can say that
database successfully updated while preserving
privacy and k-anonymity.                                           Fig 7 Execution time of Suppression based
                                                                                 protocol

                                                                    Above figure shows average execution time
                                                           of the protocol. From the experiment we can say that
                                                           as k increase tuple is safely inserted into the
                                                           database. Execution time depends on the size of


                                                                                                860 | P a g e
Neha Gosai, S.H.Patil / International Journal of Engineering Research and Applications
                        (IJERA) ISSN: 2248-9622 www.ijera.com
                         Vol. 2, Issue 4, July-August 2012, pp.856-861
 𝑘.Execution time increases according to the equation     [5]    N.R. Adam and J.C. Worthmann,
dataset size/𝑘.                                                  “Security-Control        Methods         for
                                                                 Statistical Databases: A Comparative
5. ACKNOWLEGDEMENT                                               Study,”         ACM Computing Surveys
         I must thank, first and foremost, my guide              (CSUR), vol. 21, no. 4, pp. 515- 556,
and Head of the Department, Dr. prof. S. H.,                     1989.
Department of Computer Science and Engineering,           [6]    R. Agrawal and R. Srikant, “Privacy
who gave me opportunity to write this paper without              preserving data mining,” in Proceedings
his guidance and patience, this dissertation would not           of the ACM SIGMOD Conference on
be possible. Finally, I thank him to review my paper             Management of Data, Dallas, TX, May
and his invaluable suggestion that make to improve               2000, pp. 439–450.
quality of my paper.                                      [7]    Andrew C. Yao, Protocols for secure
                                                                 computations, University of California
6. CONCLUSION AND FUTUREWORK                                     Berkeley, California     94720, 1982.
         In this paper, we have proposed secure           [8]     C. Clifton, M. Kantarcioglu, J. Vaidya,
protocol to check that if new tuple is being inserted            X. Lin, and     M.       Zhu, “Tools for
to the database, it does not affect anonymity of                 Privacy Preserving Distributed Data
database. It means when new tuple get introduced, k-             Mining,” ACM SIGKDD Explorations,
anonymous database retains its anonymity. Database               vol. 4,no.2, 2003.
updates has been carried out properly using proposed      [9]    L. Sweeney. K-anonymity: a model for
protocol. Execution shows that once system verifies              protecting      privacy.      International
user‟s tuple, it can be safely inserted to the database          Journal on Uncertainty, Fuzziness       and
without violating k-anonymity. Only user required to             Knowledge-based Systems, 10(5), 557–
send non suppressed attributes to the k-anonymous                570, 2002.
database. This is useful in medical application.          [10]   D. Boneh, G. di Crescenzo, R. Ostrowsky,
Suppression based method is not fully sufficient as if           G. Persiano. Public key encryption with
a tuple fails to check, it does not insert to the                keyword search. In Proc. of Euro crypt
database and wait until k-1.because of longer process            Conf.,Interlaken, Switzerland, 2004
and waiting time.                                         [11]    Privacy-Preserving       Updates         to
                                                                 Anonymous and Confidential Databases
The important issues in future will be resolved:                 ,Alberto Trombetta, Wei Jiang, Elisa
1) Implement database for invalid entries.                       Bertino and Lorenzo Bossi, Department
2) Solve problem of anonymity when initially table               of Computer Science                     and
is empty.                                                        Communication, University of Insubria,
3) When system fails to check tuple, it checks these             Italy.
    tuple in wait state called hanging tuples.try to      [12]    M. K. Reiter, A. Rubin. Crowds:
resolve this problem.                                            anonymity with Web transactions.ACM
4) Improving efficiency of protocol in terms of                  Transactions on Information and System
number of messages exchanged between user and                    Security (TISSEC), 1(1), 1998; 66–92.
database.                                                 [13]    J. Li, N. Li, W. Wins borough. Policy-
5) Implement real world database system.                         hiding     access    control    in    open
                                                                 environment. In Proc of ACM Conf. on
7. REFERENCES                                                    Computer and Communications Security
    [1]    U.S. Department of Justice, Privacy                   (CCS), Alexandria, Virginia, 2005.
           Technology     Focus       Group     Final     [14]   S. Brands, Untraceable off-line cash in
           Report, IJIS Institute.                               wallets with observers. In Proc. Of
    [2]    P. Samarati. Protecting respondent‟s                  CRYPTO          onf. Lecture
           privacy in     micro data release. IEEE                               Notes     in     Computer
           Transactions on Knowledge and Data                    Science, 773, 1994; 302-318.
           Engineering, vol. 13, no.6, pp. 1010–          [15]   Generalization Based Approach to
           1027, Nov/Dec.           2001.                        Confidential Database Updates , Neha
    [3]    Agrawal and Srikant, 2000; Rizvi and                  Gosai, S H      Patil,   Department       of
           Haritsa,2002;            Evfimievski    et            ComputerScience,pune,Maharashtra,2012
           al., 2004                                      [16]   www.wikipedia.com/wikifiles/.
    [4]    C.K. Liew, U.J. Choi, and C.J. Liew, “A
           Data Distortion        by      Probability
           Distribution,” ACM Trans.        Database
           Systems (TODS), vol. 10, no. 3, pp. 395-
           411, 1985.



                                                                                             861 | P a g e

More Related Content

What's hot

Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringIEEEFINALYEARPROJECTS
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilityPvrtechnologies Nellore
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePvrtechnologies Nellore
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...IRJET Journal
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability Adz91 Digital Ads Pvt Ltd
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityShakas Technologies
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET Journal
 
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET Journal
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
Control Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based EncryptionControl Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based Encryptionpaperpublications3
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data MiningVrushali Malvadkar
 
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...IJERA Editor
 

What's hot (20)

Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
 
J018116973
J018116973J018116973
J018116973
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Control Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based EncryptionControl Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based Encryption
 
H1803035056
H1803035056H1803035056
H1803035056
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data Mining
 
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
 

Viewers also liked

Viewers also liked (20)

Jp2416601666
Jp2416601666Jp2416601666
Jp2416601666
 
Hg2412901297
Hg2412901297Hg2412901297
Hg2412901297
 
I24056076
I24056076I24056076
I24056076
 
Hc2412691276
Hc2412691276Hc2412691276
Hc2412691276
 
Hq2413531358
Hq2413531358Hq2413531358
Hq2413531358
 
Gb2410971101
Gb2410971101Gb2410971101
Gb2410971101
 
Ii2414621475
Ii2414621475Ii2414621475
Ii2414621475
 
Fy2410811087
Fy2410811087Fy2410811087
Fy2410811087
 
Hm2413291336
Hm2413291336Hm2413291336
Hm2413291336
 
G24041050
G24041050G24041050
G24041050
 
Hw2413871391
Hw2413871391Hw2413871391
Hw2413871391
 
Il2414861489
Il2414861489Il2414861489
Il2414861489
 
Fl2410041009
Fl2410041009Fl2410041009
Fl2410041009
 
Fs2410401044
Fs2410401044Fs2410401044
Fs2410401044
 
Er31950953
Er31950953Er31950953
Er31950953
 
Activate 2.0
Activate 2.0Activate 2.0
Activate 2.0
 
PresentacióN1guhjjjj
PresentacióN1guhjjjjPresentacióN1guhjjjj
PresentacióN1guhjjjj
 
Realmente Cuidamos Nuestro Cuerpo
Realmente Cuidamos Nuestro CuerpoRealmente Cuidamos Nuestro Cuerpo
Realmente Cuidamos Nuestro Cuerpo
 
Material de apoyo clase 4 para el análisis de riesgo
Material de apoyo clase 4 para el análisis de riesgoMaterial de apoyo clase 4 para el análisis de riesgo
Material de apoyo clase 4 para el análisis de riesgo
 
arqueros
arquerosarqueros
arqueros
 

Similar to Ej24856861

Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudIOSR Journals
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Miningijujournal
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Miningijujournal
 
V1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.docV1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.docpraveena06
 
User-Centric Privacy Control in Identity Management and Access Control within...
User-Centric Privacy Control in Identity Management and Access Control within...User-Centric Privacy Control in Identity Management and Access Control within...
User-Centric Privacy Control in Identity Management and Access Control within...IJCI JOURNAL
 
Protecting Privacy When Disclosing Information: K Anonymity and its Enforceme...
Protecting Privacy When Disclosing Information: K Anonymity and its Enforceme...Protecting Privacy When Disclosing Information: K Anonymity and its Enforceme...
Protecting Privacy When Disclosing Information: K Anonymity and its Enforceme...ijcnes
 
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...IJSRD
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...IEEEGLOBALSOFTTECHNOLOGIES
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudIJSRD
 
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data MiningPerformance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Miningidescitation
 
Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...ElavarasaN GanesaN
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachIRJET Journal
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudJAVVAJI VENKATA RAO
 
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)ElavarasaN GanesaN
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case StudyEvelyn Donaldson
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data SharingIJERA Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...cscpconf
 

Similar to Ej24856861 (20)

Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
V1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.docV1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.doc
 
User-Centric Privacy Control in Identity Management and Access Control within...
User-Centric Privacy Control in Identity Management and Access Control within...User-Centric Privacy Control in Identity Management and Access Control within...
User-Centric Privacy Control in Identity Management and Access Control within...
 
Protecting Privacy When Disclosing Information: K Anonymity and its Enforceme...
Protecting Privacy When Disclosing Information: K Anonymity and its Enforceme...Protecting Privacy When Disclosing Information: K Anonymity and its Enforceme...
Protecting Privacy When Disclosing Information: K Anonymity and its Enforceme...
 
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
 
Ib3514141422
Ib3514141422Ib3514141422
Ib3514141422
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
 
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data MiningPerformance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
 
Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...
 
J017536064
J017536064J017536064
J017536064
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
 
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
 

Ej24856861

  • 1. Neha Gosai, S.H.Patil / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.856-861 Privacy Conserving Approach to Confidential Database Neha Gosai*,S.H.Patil** *Department of Computer engineering, Bharati Vidyapeeth University,Pune, Maharashtra-411043 **Department of Computer engineering, Bharati Vidyapeeth University,Pune, Maharashtra-411043 ABSTRACT Suppose Bank has private data of each remove personal identifier to protect private account holder which contains account number, information. There are many ways of anonymization details of account hoder.Now bank wants to share but we will focus on k-anonymization approach data with researchers for some specific purpose only. in such a way that privacy of individual account Data anonymization enables transferring holder not violated by disclosing his data to information between two organizations, by researchers. If allow account holder to directly converting text data into non human readable form add data into the database of researcher it will using encryption method[1].There have been lots of violate confidentiality of research database and if techniques developed.K-anonymization is one of the allow researchers to directly read the contents, approach[2].his technique protects privacy of violates privacy of account holder. To preserve original data by modification. So problem arises at privacy and confidentiality we have proposed this point where database needs to be updated. So approach on suppression based k-anonymous when tuple is to be inserted in the database problems method to protect privacy of individual. occurs relating to privacy and confidentiality that Is database owner decide that whether database Keywords- Privacy, Anonymous, Suppression, preserve privacy without knowing what new tuple to Confidentiality be inserted. In this paper, we propose a protocol called Suppression based approach to solve above 1. INTRODUCTION problem. Today society is growing in terms of data collection, containing personal details or some other confidential information. Because, use of computers increasing, its privacy or security becomes crucial. Database modelled as collection of data that can be accessed, updated and it enables user to retrieve data. To provide security to these databases is big issue. For example, Medical data of each patient should be protected for years. There are different approaches to protect database. The emphasis in database privacy should fall on a balance between confidentiality, integrity and availability of personal Fig 1 Anonymous Database data, rather than on confidentiality alone. Database Fig 1 shows approach to update anonymous privacy concerns the protection of information about database. Suppose Alice is user who owns the individuals that is stored in a database. Sometimes, database and data provider that is Bob who wants to without your knowledge, health records used by insert his own tuple.So it is necessary to check insurance companies, drug manufacturing whether it is possible to update database or inserting companies. Because medical records may contain tuple without knowledge of Bob so that privacy of some sensitive information like effect of drug on Bob cannot be violated and confidentiality of patient it is important to keep this information database does not violated if Bob have access to the private. Confidential data is personal information contents of database. relating to a person, it could be reference to an identification number or other factors like social 2. PROBLEMS WITH CURRENT identity. To maintain confidentiality, unauthorized APPROACH third parties must be prevented from accessing and There are various techniques to provide viewing medical data. It is also essential to maintain confidentiality and privacy to anonymous database database integrity while data is transferring from like Data Reduction, Data perturbation and Secure source to destination. Confidentiality is achieved by Multiparty Computation etc. Cryptography methods or tools. Though data is The first approach is Data perturbation anonymized, Confidentiality is technique derived from secure database techniques necessary.Anonymized or anonymization means to overcome privacy preserving problem. It is effective application to protect health care system. 856 | P a g e
  • 2. Neha Gosai, S.H.Patil / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.856-861 Basically there are two types of data perturbation. content of tuple and without sending tuple to owner First type Probability distribution approach and the [11].To achieve this goal two party exchange second type are called the value distortion approach. message by encrypting. Or say by anonymous In the probability distribution, Original database is connection using protocol like Crowds [12].Crowd replaced by sample from distribution or by protocol is anonymity protocol which hides each distribution itself [4] and the value distortion user‟s communication by routing them randomly approach perturbs data elements or attributes directly within group of similar users. This is necessary by either additive noise, multiplicative noise, or because attacker can easily reveal IP address and get some other randomization procedures [5]. Agrawal sensitive information. It can be leaked from access et al. [6] proposed a value distortion technique to control policies, so it is necessary to provide protect the privacy by adding random noise from a authorization so that only authorized party can Gaussian distribution to the actual data. They access data. This is based on user anonymous showed that this technique appears to mask the data authentication [13].Our problem is to privately while allowing extraction of certain patterns like the updates of anonymous and confidential databases. original data distribution and decision tree models 3.1 Prototype Architecture with good accuracy. Second research approach is Secure Multiparty Computation method consider problem of evaluating function of two or more parties‟ secret input in such a way that each party does not get anything else except specified output. Secure computation was formally introduced in 1982 by A. Yao This concept is important in field of cryptography. For example two parties having some secret information-𝑎 and 𝑏 respectively. They compute joint function 𝑓 𝑎, 𝑏 without disclosing information about 𝑎 and 𝑏 .Main aim of using SCM is to allow maximum use of information without compromising user privacy .However, computational complexity makes this approach Fig 2 Proposed System infeasible for large dataset. There are different tool available for large dataset [8]. In fig 2 There are different modules The third approach is private data retrieval shown:Cryptographic Module,Private related to SMC. It focuses on Queries for retrieving Checker,Loader Module.Job of cryptographic data from database. But still it doesn‟t concern with module is to encrypt all tuples between Data privately updating database. Other techniques have Provider and Private checker.Loader module read been developed that is data anonymization, which and transfer tuple from Anonymous database. protects data through suppression or perturbation in Private checker module performs all the controls that stastical database. Sweeny who proposed concept of is it checks whether the inserted data is matched k-anonymity[9].But after researching on algorithm with the data‟s in the anonymous database using result comes out that it still not resolves problem of suppression method. The main concept behind privately update of database. private checker is to check whether insertion is The fourth approach is Query Processing possible into the k anonymous database. Techniques for encrypted data [10].These approach provide whole data to client, though it encrypts all 3.2 Suppression Based Method to Update data. But this is not concern to our approach. Most Confidential Databases of privacy models developed are based on k- anonymity property-anonymity property deals the Consider Table T ={t1,…,tn} over the possibility of indirect identification of records form attribute set A. The idea of this algorithm is mask public databases-anonymity means each released some attributes by special value *,the value record has at least (k-1) other records in the release employed by Alice for the anonymization. whose values are indistinct[15]. K-anonymity and SMC are used in privacy-preserving data mining, but they are quite different in terms of efficiency, accuracy. 3. PROPOSED PROTOCOL The protocol Suppression based method for anonymous database allows the owner of database DB to anonymize tuple t, without knowledge of 857 | P a g e
  • 3. Neha Gosai, S.H.Patil / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.856-861 Table 1 Original Dataset updating, and an approach that can be used is based AREA POSITION SALARY on techniques for user anonymous authentication Networking Professor 12,000 and credential verification. Networking Professor 20,000 Programming Professor 25,000 The Diffie Hellman key exchange Language algorithm allows two users to establish shared secret Programming Professor 20,000 key over insecure communication without having Language any prior knowledge. Here, Diffie Hellmen is used Database System Assistant 50,000 to agree on shared secret key to exchange data Database System Assistant 40,000 between two parties. Here, we have assumed that database is k-anonymous. So it needs to check that Table 2 Suppressed Data with k =2 after inserting properly anonymized tuple, by Bob, AREA POSITION SALARY whether database (Alice) maintains its k-anonymity. If this is the case, tuple can be inserted otherwise * * * tuple will be rejected.AES (Advance Encryption * * * Scheme) is symmetric key algorithm, means same Programming Professor * key used for encryption and decryption, for Language encryption of data. Programming Professor * Language 4. ALGORITHM * * * In suppression based method of anonymous * * * database, our main aim to compute anonymized In suppression based method, Every attribute is version of tuple t without letting Alice and Bob suppressed by *.So third party cannot differentiate know about the contents of tuple t and what are the between any tuples. Table 2 shows Suppressed suppressed attributes in tuple t. Suppose, Alice and attributes or data with k= 2.Here,k=2 indicates k- Bob agree on the commutative and product anonymity that is each row in the table cannot be homomorphic encryption scheme. Steps are distinguished from at least other k-1 rows by only described as below: looking a set of attributes[9]. 1) Alice encrypts tuples with her private key and 3.3 Cryptography Assumption sends it to Bob. Suppression based k-anonymity protocol 2) Upon receiving encrypted version of tuple Bob uses encryption scheme of commutative and product it again encrypts tuple with his key send it to Alice. homomorphic. This encryption scheme allows 3) Alice decrypts values to get Bob‟s key. performing mathematical operation over encrypted 4) Alice examines if the suppressed attributes of data. We provide definition of Commutativity, tuple is equal to the tuple sent by Bob. If yes then product homomorphic and indistiguishability [14]. insert tuple in database. Given a finite set 𝐾 of keys and a finite domain, a commutative, product homomorphic encryption 4.1 Implementation scheme E is a polynomial time computable function Suppression based k-anonymity approach 𝐸: 𝐾 × 𝐷 → 𝐷 satisfying the following properties: to provide privacy updates to confidential database is designed by using Java. The implementation setup 1) Commutativity: For all key pairs 𝑘1, 𝑘2 ∈ 𝐾 and Considered attributes AREA, POSITION and value 𝑑 ∈ 𝐷,the following equality holds: SALARY. We have considered POSITION as non 𝐸𝑘1 𝐸𝑘2 𝑑 = 𝐸𝑘2(𝐸𝑘1(𝑑)) suppressed attribute. Figure 2 shows home page of 2) Product Homomorphism: For every 𝑘 ∈ 𝐾 Suppression based approach. Data entered by the and every value pairs 𝑑1, 𝑑2 ∈ 𝐷 ,the following user directly replaced by special value „*‟ and these equality holds: values being inserted into table. To carry out this task, we have made separate table for original 𝐸𝑘 𝑑1 ∙ 𝐸𝑘 𝑑2 = 𝐸𝑘(𝑑1 ∙ 𝑑2) values. When user enters data it checks value in original table if it is valid then it replaces original 3) Indistinguishability: It is infeasible to value with suppressed values. Based on this outcome obtain data of plaintext from cipher text. The data will get inserted or rejected as shown in advantages are high privacy of data even after snapshot below. 858 | P a g e
  • 4. Neha Gosai, S.H.Patil / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.856-861 Fig 3 Attributes with wrong data value Fig 4 Output screen of wrong data values 859 | P a g e
  • 5. Neha Gosai, S.H.Patil / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.856-861 Fig 5 Attributes with correct Values Fig 6 Output screen of correct values 4.2 Result From the implementation, we can say that the complexity of protocol depends on number of message exchanged and their size. The complexity of protocol depends on the size of T. We have used java as front end and My SQL for database. Experiment executed on Pentium 1GHz with 1 GB physical memory. We can make result that if all values entered by data provider is correct then database will be updated successfully otherwise tuple will not be inserted to the database. Thus we can say that database successfully updated while preserving privacy and k-anonymity. Fig 7 Execution time of Suppression based protocol Above figure shows average execution time of the protocol. From the experiment we can say that as k increase tuple is safely inserted into the database. Execution time depends on the size of 860 | P a g e
  • 6. Neha Gosai, S.H.Patil / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.856-861 𝑘.Execution time increases according to the equation [5] N.R. Adam and J.C. Worthmann, dataset size/𝑘. “Security-Control Methods for Statistical Databases: A Comparative 5. ACKNOWLEGDEMENT Study,” ACM Computing Surveys I must thank, first and foremost, my guide (CSUR), vol. 21, no. 4, pp. 515- 556, and Head of the Department, Dr. prof. S. H., 1989. Department of Computer Science and Engineering, [6] R. Agrawal and R. Srikant, “Privacy who gave me opportunity to write this paper without preserving data mining,” in Proceedings his guidance and patience, this dissertation would not of the ACM SIGMOD Conference on be possible. Finally, I thank him to review my paper Management of Data, Dallas, TX, May and his invaluable suggestion that make to improve 2000, pp. 439–450. quality of my paper. [7] Andrew C. Yao, Protocols for secure computations, University of California 6. CONCLUSION AND FUTUREWORK Berkeley, California 94720, 1982. In this paper, we have proposed secure [8] C. Clifton, M. Kantarcioglu, J. Vaidya, protocol to check that if new tuple is being inserted X. Lin, and M. Zhu, “Tools for to the database, it does not affect anonymity of Privacy Preserving Distributed Data database. It means when new tuple get introduced, k- Mining,” ACM SIGKDD Explorations, anonymous database retains its anonymity. Database vol. 4,no.2, 2003. updates has been carried out properly using proposed [9] L. Sweeney. K-anonymity: a model for protocol. Execution shows that once system verifies protecting privacy. International user‟s tuple, it can be safely inserted to the database Journal on Uncertainty, Fuzziness and without violating k-anonymity. Only user required to Knowledge-based Systems, 10(5), 557– send non suppressed attributes to the k-anonymous 570, 2002. database. This is useful in medical application. [10] D. Boneh, G. di Crescenzo, R. Ostrowsky, Suppression based method is not fully sufficient as if G. Persiano. Public key encryption with a tuple fails to check, it does not insert to the keyword search. In Proc. of Euro crypt database and wait until k-1.because of longer process Conf.,Interlaken, Switzerland, 2004 and waiting time. [11] Privacy-Preserving Updates to Anonymous and Confidential Databases The important issues in future will be resolved: ,Alberto Trombetta, Wei Jiang, Elisa 1) Implement database for invalid entries. Bertino and Lorenzo Bossi, Department 2) Solve problem of anonymity when initially table of Computer Science and is empty. Communication, University of Insubria, 3) When system fails to check tuple, it checks these Italy. tuple in wait state called hanging tuples.try to [12] M. K. Reiter, A. Rubin. Crowds: resolve this problem. anonymity with Web transactions.ACM 4) Improving efficiency of protocol in terms of Transactions on Information and System number of messages exchanged between user and Security (TISSEC), 1(1), 1998; 66–92. database. [13] J. Li, N. Li, W. Wins borough. Policy- 5) Implement real world database system. hiding access control in open environment. In Proc of ACM Conf. on 7. REFERENCES Computer and Communications Security [1] U.S. Department of Justice, Privacy (CCS), Alexandria, Virginia, 2005. Technology Focus Group Final [14] S. Brands, Untraceable off-line cash in Report, IJIS Institute. wallets with observers. In Proc. Of [2] P. Samarati. Protecting respondent‟s CRYPTO onf. Lecture privacy in micro data release. IEEE Notes in Computer Transactions on Knowledge and Data Science, 773, 1994; 302-318. Engineering, vol. 13, no.6, pp. 1010– [15] Generalization Based Approach to 1027, Nov/Dec. 2001. Confidential Database Updates , Neha [3] Agrawal and Srikant, 2000; Rizvi and Gosai, S H Patil, Department of Haritsa,2002; Evfimievski et ComputerScience,pune,Maharashtra,2012 al., 2004 [16] www.wikipedia.com/wikifiles/. [4] C.K. Liew, U.J. Choi, and C.J. Liew, “A Data Distortion by Probability Distribution,” ACM Trans. Database Systems (TODS), vol. 10, no. 3, pp. 395- 411, 1985. 861 | P a g e