SlideShare a Scribd company logo
1 of 6
Download to read offline
Confidential Multiparty Computation with
Anonymous ID Assignment using Central Authority
P Babitha1
P Yogendra Prasad2
A C Reddy Sagar3
Assist Professor Assist Professor Assist Professor
SISTK SISTK SISTK
ABSTRACT- For giving out private data securely
between several parties an algorithm has been
used. An anonymous ID assignment technique is
used iteratively to assign the nodes with ID
numbers ranging from 1 to N. This technique
enhances data that are more complex to be
shared securely. The nodes are assigned with the
anonymous ID with the help of a central
authority. The algorithm has been compared
with the existing algorithm. In this paper we
propose an algorithm has been developed based
on Sturm’s theorem and Newton’s identities.
The numbers of iterations are found out with the
help of Markov chain.
KEYWORDS: Anonymous Id, AIDA-Anonymous Id
Assignment.
1. INTRODUCTION
The anonymous message plays a very significant
role in internet’s popularity for both individual
and business purposes. Cloud based website
management tools enable the servers to analyze
the user’s behavior. The disadvantages of giving
out private data are being studied in detail.
Other applications for anonymity are various viz
Doctor medical records, social networking,
electronic voting and many more. In secure
multiparty computation which is a new form of
anonymity allows several multiple parties to
share data that remains unknown? A secure
computation function enables multi parties to
compute the sum of their inputs rather than
revealing the data. This method is very much
well-liked in data mining operations and enables
classifying the complexities of secure multiparty
computation.
Our main algorithm is built on top of a method
that shares simple data anonymously and yields
a technique that enables sharing of complex
data anonymously. With the help of permutation
methods the assigned ID are known only to the
nodes which are being assigned IDs. There are
several applications where network nodes needs
self-motivated unique IDs. One such application
is grid computing where the services are
requested without disclosing the identities of
the service requestor. To differentiate between
anonymous communication and anonymous ID
assignment, think about a situation where N
parties wish to exhibit their data in total, in N
slots on a third party site, anonymous ID
assignment method assigns N slots to the users
whereas anonymous communication allows the
users to conceal their identities In our network
the identities of the parties are known but not
the true identity. In this project we use an
algorithm for sharing simple integer data which
is based on secure sum. This algorithm is used in
every iteration of anonymous ID assignment.
Here we consider all the nodes to be half direct.
Even though they follow a set of rules for
message if they happen to see information they
might intrude.
Proceedings of International Conference on Developments in Engineering Research
ISBN NO : 378 - 26 - 13840 - 9
www.iaetsd.in
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
111
In existing system, the information about each
node will be shared along with the data. It is
usually encrypted along with the data. The usage
of Newton’s polynomial cannot be avoided as it
increases the number of rounds of iterations
that are used to compute the secure sum and
power sum. Hence the performance of the
system also decreases. It only focuses on the
sum inputs whereas our project deals with the
number of rounds. The usage of secure
multiparty computation is being avoided with
the usage of Sturm’s theorem to make sure that
the information about the nodes are not
revealed. In the current system the main goal is
to provide anonymous id for each node. Each
node will have a secure communication of
simple and complex data. Those data’s may be
from static data or dynamic data. By
implementing secure sum hides permutations
method and anonymous id assignment (AIDA)
method the permutation methods are kept
anonymous to each other. Hence here encoding
technology is used to create anonymous ID and
the ID is being assigned to the user by the
central authority and the receiver receives the
data and decodes it with the key that is known
only to the sender and the receiver which might
not be known to the other semi honest node
that might intrude.
II MODULES DESCRIPTIONS
AUTHENTICATION
The process of identifying an individual usually
based on a username and password. In security
systems, Authentication merely ensures that the
individual is who he or she claims to be, but says
nothing about the access rights of the individual.
1 LOGIN:
In User and Admin login we are going to check
whether the system is trusted machine or
distrust machine. If the machine is trusted then
the user or admin is allowed with n attempts. If
the machine is distrusted machine then the user
is allowed with single attempt. Process Involved
is to Check the login name and password Then
allows the authorized user to use these pages. If
the unauthorized user attempts to access user
login then restrict that user and give the
information.
A FORGET PASSWORD:
When the users forget their password then the
user can access this forget password. It is used to
create a new password. To ensure that user
accessing forget password is a legitimate user,
the user will be asked a question. These
questions and their answers are created, while
the user is registering to the site. If the user
enters the answer then the entered text will be
matched with the database. If the result is true,
then the user will be allowed to enter the new
password to access the site. If the result is false,
user will not be allowed to enter the new
password to access the site.
B REGISTRATION:
When a new user is creating an account he
needs to register here by giving the sufficient
information. Registration might also contain
some private data that will be kept confidential
so that the information about username and
password is retrieved when it is forgotten.
2 ADMIN:
In this module when the admin attempts to login
we need to find whether the machine is trusted
or it is distrusted machine. It is found by user id
and pass word. Admin can provide AID to all
nodes. With the help of that AID each node can
share the data in internet. Admin can generate
that AID for individual nodes. So the sharable
data can be kept in a sharable database. As a
result their own private data will be maintained
secret.
A GENERATES AID:
In this module admin wants to create the AID for
individual nodes. Admin can make this unique
Proceedings of International Conference on Developments in Engineering Research
ISBN NO : 378 - 26 - 13840 - 9
www.iaetsd.in
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
112
AID for each user presented in network. With
the help of this AID user can share his data and
also he can keep his own private data as secret.
B ASSIGN AID:
Admin can provide unique AID to all nodes.
Nodes presented in network will be
communicating by using AID. AID can not
contain any private information.AID helps to
keep personal information as more secret.
3. USERS
Users can login by entering the given username
and password. Then he/she may go for
corresponding page. User can keep his own
information in a sharable data base. And also he
can retrieve data shared by other users. User has
to use his AID for sharing information.
A SHARE DATA:
New user has to get AID from admin. Admin will
assign that AID for every node. So data shared by
user can be kept in a sharable database and it
can be shared by all users. Each node will have
unique AID with the help of that unique AID any
user can store and retrieve from sharable
database.
B RETRIEVE SHARED DATA:
In this module user can retrieve the shared data.
Shared data may be stored by him or by any
other node. So it will be easy to make own
private data as secret by implementing
anonymous id algorithm.
A SHARE DATA:
New user has to get AID from admin. Admin will
assign that AID for every node. So data shared by
user can be kept in a sharable database and it
can be shared by all users. Each node will have
unique AID with the help of that unique AID any
user can store and retrieve from sharable
database.
B RETRIEVE SHARED DATA:
In this module user can retrieve the shared data.
Shared data may be stored by him or by any
other node. So it will be easy to make own
private data as secret by implementing
anonymous id algorithm.
Secure sum Algorithm
Given nodes each holding an data item from a
finitely represent able abelian group, share the
value among the nodes without revealing the
values .
1) Each node , chooses random values such that
ri,1+…ri,N = di
2) Each “random” value is transmitted from
node to node . The sum of all these random
numbers is, ofcourse, the desired total .
3) Each node totals all the random values
received as:
si,j = r1,j+…+ rN,j
4) Now each node simply broadcasts to all other
nodes so that each node can compute:
T = s1 +…sN
AIDA Algorithm Implementation:
Given nodes n1,…,nN, use distributed
computation (without central authority) to find
an anonymous indexing permutation s : {1,…,N}
{1,…,N}.
1) Set the number of assigned nodes A = 0.
2) Each unassigned node chooses a random
number in the range 1 to S. A node assigned in a
previous round chooses r1 = 0.
3) The random numbers are shared
anonymously. Denote the shared values by
q1,…,qN.
4) Let q1,…,qk denote a revised list of shared
values with duplicated and zero values entirely
removed where k is the number of unique
random values. The nodes ni which drew unique
random numbers then determine their index si
from the position of their random number in the
Proceedings of International Conference on Developments in Engineering Research
ISBN NO : 378 - 26 - 13840 - 9
www.iaetsd.in
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
113
revised list as it would appear after being sorted:
si = A + Card{qj : qj <=ri}
5) Update the number of nodes assigned: .
6) If A < N then return to step (2).
Basic formula
P (collision) =1-e^(-N^2/(2*H))=alpha
N=sqrt (2*ln (1/1-alpha))*sqrt (H)
N: number of evenly distributed hashes to
compare
H: the Size of the element count of all possible
hashes
H=2^ (IDlength *ln (36)/ln (2))
Hashes calculated with SHAI (IDlength<=30).
K.Communications Requirements of AIDA
Methods
Consider the required number of data bits for
each of the three variant methods just
described. This is the number of data bits that
would be transmitted in each packet by the
secure sum algorithm introduced earlier. The
required numbers of data bits B are slightly
overestimated by the formulae: = N.
[ 2(P+1)] = N. [ 2(N)] /2.[ 2(S)]
= S. [ 2(N+1)] (2) The computational
requirements of the “slot selection” appear, at
first, to be trivial. However, for every root that
the “prime modulus” method must check, “slot
selection”. L. The Completion Rate after R
Rounds Two nodes might make identical choices
of random numbers, or slots as they will be
termed in this section. One can only guarantee
that a complete assignment of nodes using
possibilities for slots or random number choices
and rounds will occur with at least a desired
probability. The formulae are derived by
assuming that N -1 node have chosen slots and
looking at the next choice. The Nth node into
choose a slot resulting in assignments and
conflicts. The slot it chooses could be
unassigned, already in conflict with multiple
occupants, or already assigned with exactly one
occupant.
III. EXPERIMENTAL RESULTS
SI.NO N H P
1 189 45 390
2 210 55 400
3 290 95 442
4 549 225 667
5 999 455 1109
Table 1: Anonymous ID creation Algorithm
Results are given in terms of identities. N
represents the number of evenly distributed
hashes to compare. H indicates the size of the
element count of all possible hashes. P Indicates
the value of anonymous ID. This is unique to
every members of the group. Anonymous ID
received is unknown to other members of the
group. Anonymous id is examined between
communication and computational requirement.
IV. CONCLUSION
Proposed paper greatly decreases
communication overhead. By using private
communication channel that is anonymity
router to transmit the data more securely.
To overcome the problem of identifying
details and changing information
anonymous id was utilized. Random serial
number is used to identify whether the data
requesting person is a correct authorized
person or hackers. The use of the Newton
identities greatly decreases communication
overhead. This can enable the use of a larger
number of “slots” with a consequent
reduction in the number of rounds required.
Proceedings of International Conference on Developments in Engineering Research
ISBN NO : 378 - 26 - 13840 - 9
www.iaetsd.in
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
114
The solution of a polynomial can be avoided
at some expense by using Sturm’s theorem.
The development of a result similar to the
Sturm’s method over a finite field is an
enticing possibility. With private
communication channels, the algorithms are
secure in an information theoretic sense.
Apparently, this property is very fragile. The
very similar problem of mental poker was
shown to have no such solution with two
players and three cards. The argument can
easily be extended to, e.g., two sets each of
N colluding players with a deck of 2N+1
cards rather than our deck of 2N cards. In
contrast to bounds on completion time
developed in previous works, our formulae
give the expected completion time exactly.
All of the no cryptographic algorithms have
been extensively simulated, and the present
work does offer a basis upon which
implementations can be constructed. The
communications requirements of the
algorithms depend heavily on the underlying
implementation of the chosen secure sum
algorithm. In some cases, merging the two
layers could result in reduced overhead.
REFERENCES
[1] Sarbanes–Oxley Act of 2002, Title 29,
Code of Federal Regulations,Part 1980,
2003.
[2] Y.Zhang, W.Liu, and W.Lou .Anonymous
communications in mobile ad hoc networks.
In INFOCOM 2005, 24th annual joint
conference the IEEE Computer Societies.
Proceeding IEEE, volume 3, pages 1940–
1951, March 2005.
[3] D. Chaum, “Untraceable electronic mail,
return address and digital pseudonyms,”
Commun. ACM, vol. 24, no. 2, pp. 84–88,
Feb.1981.
[4] C. Clifton, M. Kantarcioglu, J. Vaidya, X.
Lin, and M. Y. Zhu, “Tools for privacy
preserving distributed data mining,” ACM
SIGKDD Explorations Newsletter, vol. 4, no.
2, pp. 28–34, Dec. 2002.
[5] J. Wang, T. Fukasama, S. Urabe, and
T.Takata, “A collusion-resistant approach to
privacy-preserving distributed data mining,”
IEICE Trans.Inf.Syst. (Inst. Electron. Inf.
Commun. Eng.), vol. E89-D, no. 11, pp.2739–
2747, 2006.
[6] F. Baiardi, A. Falleni, R. Granchi, F.
Martinelli, M. Petrocchi, and A.Vaccarelli,
“Seas, a secure e-voting protocol: Design
and implementation,” Comput. Security, vol.
24, no. 8, pp. 642–652, Nov. 2005.
[7] Sanil, A. P., Karr, A. F., Lin, X., and Reiter,
J. P. (2007). Privacy preserving analysis of
vertically partitioned data using secure
matrix products.
[8] J. Kong and X. Hong. Anodr: anonymous
on demand routing with untraceable routes
for mobile ad-hoc networks. InMobihoc’03:
Proceedings of the 4th ACM international
symposium on Mobile ad hoc networking
ages 291–302, New York, NY, USA,2003.
[9] J. Yoon and H. Kim, “A new collision-free
pseudonym scheme in mobile ad hoc
networks,”5th workshop on Resource
allocation, Cooperation and competition in
wireless networks. June 2009.
Proceedings of International Conference on Developments in Engineering Research
ISBN NO : 378 - 26 - 13840 - 9
www.iaetsd.in
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
115
[10] A. Friedman, R. Wolff, and A. Schuster,
“Providing k-anonymity in data mining,”
VLDB Journal, vol. 17, no. 4, pp. 789–804,
Jul. 2008.
[11] J. Domingo-Ferrer, “A new privacy
homomorphism and applications,”
Information Processing Letters, vol. 60, no.
5, pp. 277–282, December1996.[Online].
Available: citeseer.nj.nec.com/290190.html
[12] J. Domingo-Ferrer, “A provably secure
additive and multiplicative privacy homo
morphishm,” in Information Security, ser.
Lecture Notes in Computer Science, A. Chan
and V. Gligor, Eds., vol. 2433. Springer
Verlag, 2002, pp. pp. 471–483.
[13] D. M. Goldschlag,M. G. Reed, and P. F.
Syverson, “Hiding routing information,”
inProc. Information Hiding, 1996, pp.
137150,Springer Verlag
[14] A. Karr, “Secure statistical analysis of
distributed databases, emphasizing what we
don’t know,” J. Privacy Confidentiality, vol.
1, no.2,pp. 197–211, 2009.
[15] Q. Xie and U. Hengartner, “Privacy-
preserving matchmaking for mobile social
networking secure against malicious users,”
in Proc. 9thAnn. IEEE Conf. Privacy, Security
and Trust, Jul. 2011, pp. 252–259.
Proceedings of International Conference on Developments in Engineering Research
ISBN NO : 378 - 26 - 13840 - 9
www.iaetsd.in
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
116

More Related Content

What's hot

Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesAdz91 Digital Ads Pvt Ltd
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applicationsPreserving location privacy in geo social applications
Preserving location privacy in geo social applicationsShakas Technologies
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyIJCERT
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applications Preserving location privacy in geo social applications
Preserving location privacy in geo social applications Adz91 Digital Ads Pvt Ltd
 
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyEnhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyIJTET Journal
 
Password authentication in cloud
Password authentication in cloudPassword authentication in cloud
Password authentication in cloudIJERA Editor
 
Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systemseSAT Journals
 
Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systemseSAT Publishing House
 
Network Security Using IDS, IPS & Honeypot
Network Security Using IDS, IPS & HoneypotNetwork Security Using IDS, IPS & Honeypot
Network Security Using IDS, IPS & Honeypotpaperpublications3
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
 
preserving location privacy in geosocial applications
preserving location privacy in geosocial applicationspreserving location privacy in geosocial applications
preserving location privacy in geosocial applicationsswathi78
 
IRJET- Quinn: Medical Assistant for Mental Counseling using Rasa Stack
IRJET-  	  Quinn: Medical Assistant for Mental Counseling using Rasa StackIRJET-  	  Quinn: Medical Assistant for Mental Counseling using Rasa Stack
IRJET- Quinn: Medical Assistant for Mental Counseling using Rasa StackIRJET Journal
 
IRJET- Suspicious Mail Detection
IRJET-  	  Suspicious Mail DetectionIRJET-  	  Suspicious Mail Detection
IRJET- Suspicious Mail DetectionIRJET Journal
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationYogeshIJTSRD
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemZTech Proje
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsEnabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsIRJET Journal
 
Privacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersPrivacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersLeMeniz Infotech
 

What's hot (20)

Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applicationsPreserving location privacy in geo social applications
Preserving location privacy in geo social applications
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
P01813101103
P01813101103P01813101103
P01813101103
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applications Preserving location privacy in geo social applications
Preserving location privacy in geo social applications
 
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyEnhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
 
Internet of things Unit 1 one word
Internet of things Unit 1 one wordInternet of things Unit 1 one word
Internet of things Unit 1 one word
 
Password authentication in cloud
Password authentication in cloudPassword authentication in cloud
Password authentication in cloud
 
Gs3612141219
Gs3612141219Gs3612141219
Gs3612141219
 
Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systems
 
Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systems
 
Network Security Using IDS, IPS & Honeypot
Network Security Using IDS, IPS & HoneypotNetwork Security Using IDS, IPS & Honeypot
Network Security Using IDS, IPS & Honeypot
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
preserving location privacy in geosocial applications
preserving location privacy in geosocial applicationspreserving location privacy in geosocial applications
preserving location privacy in geosocial applications
 
IRJET- Quinn: Medical Assistant for Mental Counseling using Rasa Stack
IRJET-  	  Quinn: Medical Assistant for Mental Counseling using Rasa StackIRJET-  	  Quinn: Medical Assistant for Mental Counseling using Rasa Stack
IRJET- Quinn: Medical Assistant for Mental Counseling using Rasa Stack
 
IRJET- Suspicious Mail Detection
IRJET-  	  Suspicious Mail DetectionIRJET-  	  Suspicious Mail Detection
IRJET- Suspicious Mail Detection
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering system
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsEnabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
 
Privacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersPrivacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile users
 

Similar to Iaetsd confidential multiparty computation with

Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentJPINFOTECH JAYAPRAKASH
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Privacy preserving data sharing with a...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Privacy preserving data sharing with a...JAVA 2013 IEEE NETWORKSECURITY PROJECT Privacy preserving data sharing with a...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Privacy preserving data sharing with a...IEEEGLOBALSOFTTECHNOLOGIES
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentIEEEFINALYEARPROJECTS
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentJPINFOTECH JAYAPRAKASH
 
Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymousnexgentech15
 
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Cost-Effective Authentic and Anonymous Data Sharing with Forward Securitynexgentechnology
 
Anonymity based privacy-preserving data
Anonymity based privacy-preserving dataAnonymity based privacy-preserving data
Anonymity based privacy-preserving dataKamal Spring
 
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...IJERA Editor
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationIRJET Journal
 
IRJET- A Survey on Cryptography, Encryption and Compression Techniques
IRJET- A Survey on Cryptography, Encryption and Compression TechniquesIRJET- A Survey on Cryptography, Encryption and Compression Techniques
IRJET- A Survey on Cryptography, Encryption and Compression TechniquesIRJET Journal
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET Journal
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data MiningIJMER
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”IRJET Journal
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406pradip patel
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406pradip patel
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...IJERA Editor
 

Similar to Iaetsd confidential multiparty computation with (20)

Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Privacy preserving data sharing with a...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Privacy preserving data sharing with a...JAVA 2013 IEEE NETWORKSECURITY PROJECT Privacy preserving data sharing with a...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Privacy preserving data sharing with a...
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
 
Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymous
 
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 
Anonymity based privacy-preserving data
Anonymity based privacy-preserving dataAnonymity based privacy-preserving data
Anonymity based privacy-preserving data
 
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
IRJET- A Survey on Cryptography, Encryption and Compression Techniques
IRJET- A Survey on Cryptography, Encryption and Compression TechniquesIRJET- A Survey on Cryptography, Encryption and Compression Techniques
IRJET- A Survey on Cryptography, Encryption and Compression Techniques
 
AIDA ICITET
AIDA ICITETAIDA ICITET
AIDA ICITET
 
Paper2
Paper2Paper2
Paper2
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
 
Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data Mining
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
 

More from Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdlIaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmIaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatIaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationIaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSIaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...Iaetsd Iaetsd
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bikeIaetsd Iaetsd
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technologyIaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdIaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid GrowthIaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT AlgorithmIaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolicIaetsd Iaetsd
 

More from Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 

Recently uploaded

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 

Recently uploaded (20)

POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 

Iaetsd confidential multiparty computation with

  • 1. Confidential Multiparty Computation with Anonymous ID Assignment using Central Authority P Babitha1 P Yogendra Prasad2 A C Reddy Sagar3 Assist Professor Assist Professor Assist Professor SISTK SISTK SISTK ABSTRACT- For giving out private data securely between several parties an algorithm has been used. An anonymous ID assignment technique is used iteratively to assign the nodes with ID numbers ranging from 1 to N. This technique enhances data that are more complex to be shared securely. The nodes are assigned with the anonymous ID with the help of a central authority. The algorithm has been compared with the existing algorithm. In this paper we propose an algorithm has been developed based on Sturm’s theorem and Newton’s identities. The numbers of iterations are found out with the help of Markov chain. KEYWORDS: Anonymous Id, AIDA-Anonymous Id Assignment. 1. INTRODUCTION The anonymous message plays a very significant role in internet’s popularity for both individual and business purposes. Cloud based website management tools enable the servers to analyze the user’s behavior. The disadvantages of giving out private data are being studied in detail. Other applications for anonymity are various viz Doctor medical records, social networking, electronic voting and many more. In secure multiparty computation which is a new form of anonymity allows several multiple parties to share data that remains unknown? A secure computation function enables multi parties to compute the sum of their inputs rather than revealing the data. This method is very much well-liked in data mining operations and enables classifying the complexities of secure multiparty computation. Our main algorithm is built on top of a method that shares simple data anonymously and yields a technique that enables sharing of complex data anonymously. With the help of permutation methods the assigned ID are known only to the nodes which are being assigned IDs. There are several applications where network nodes needs self-motivated unique IDs. One such application is grid computing where the services are requested without disclosing the identities of the service requestor. To differentiate between anonymous communication and anonymous ID assignment, think about a situation where N parties wish to exhibit their data in total, in N slots on a third party site, anonymous ID assignment method assigns N slots to the users whereas anonymous communication allows the users to conceal their identities In our network the identities of the parties are known but not the true identity. In this project we use an algorithm for sharing simple integer data which is based on secure sum. This algorithm is used in every iteration of anonymous ID assignment. Here we consider all the nodes to be half direct. Even though they follow a set of rules for message if they happen to see information they might intrude. Proceedings of International Conference on Developments in Engineering Research ISBN NO : 378 - 26 - 13840 - 9 www.iaetsd.in INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT 111
  • 2. In existing system, the information about each node will be shared along with the data. It is usually encrypted along with the data. The usage of Newton’s polynomial cannot be avoided as it increases the number of rounds of iterations that are used to compute the secure sum and power sum. Hence the performance of the system also decreases. It only focuses on the sum inputs whereas our project deals with the number of rounds. The usage of secure multiparty computation is being avoided with the usage of Sturm’s theorem to make sure that the information about the nodes are not revealed. In the current system the main goal is to provide anonymous id for each node. Each node will have a secure communication of simple and complex data. Those data’s may be from static data or dynamic data. By implementing secure sum hides permutations method and anonymous id assignment (AIDA) method the permutation methods are kept anonymous to each other. Hence here encoding technology is used to create anonymous ID and the ID is being assigned to the user by the central authority and the receiver receives the data and decodes it with the key that is known only to the sender and the receiver which might not be known to the other semi honest node that might intrude. II MODULES DESCRIPTIONS AUTHENTICATION The process of identifying an individual usually based on a username and password. In security systems, Authentication merely ensures that the individual is who he or she claims to be, but says nothing about the access rights of the individual. 1 LOGIN: In User and Admin login we are going to check whether the system is trusted machine or distrust machine. If the machine is trusted then the user or admin is allowed with n attempts. If the machine is distrusted machine then the user is allowed with single attempt. Process Involved is to Check the login name and password Then allows the authorized user to use these pages. If the unauthorized user attempts to access user login then restrict that user and give the information. A FORGET PASSWORD: When the users forget their password then the user can access this forget password. It is used to create a new password. To ensure that user accessing forget password is a legitimate user, the user will be asked a question. These questions and their answers are created, while the user is registering to the site. If the user enters the answer then the entered text will be matched with the database. If the result is true, then the user will be allowed to enter the new password to access the site. If the result is false, user will not be allowed to enter the new password to access the site. B REGISTRATION: When a new user is creating an account he needs to register here by giving the sufficient information. Registration might also contain some private data that will be kept confidential so that the information about username and password is retrieved when it is forgotten. 2 ADMIN: In this module when the admin attempts to login we need to find whether the machine is trusted or it is distrusted machine. It is found by user id and pass word. Admin can provide AID to all nodes. With the help of that AID each node can share the data in internet. Admin can generate that AID for individual nodes. So the sharable data can be kept in a sharable database. As a result their own private data will be maintained secret. A GENERATES AID: In this module admin wants to create the AID for individual nodes. Admin can make this unique Proceedings of International Conference on Developments in Engineering Research ISBN NO : 378 - 26 - 13840 - 9 www.iaetsd.in INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT 112
  • 3. AID for each user presented in network. With the help of this AID user can share his data and also he can keep his own private data as secret. B ASSIGN AID: Admin can provide unique AID to all nodes. Nodes presented in network will be communicating by using AID. AID can not contain any private information.AID helps to keep personal information as more secret. 3. USERS Users can login by entering the given username and password. Then he/she may go for corresponding page. User can keep his own information in a sharable data base. And also he can retrieve data shared by other users. User has to use his AID for sharing information. A SHARE DATA: New user has to get AID from admin. Admin will assign that AID for every node. So data shared by user can be kept in a sharable database and it can be shared by all users. Each node will have unique AID with the help of that unique AID any user can store and retrieve from sharable database. B RETRIEVE SHARED DATA: In this module user can retrieve the shared data. Shared data may be stored by him or by any other node. So it will be easy to make own private data as secret by implementing anonymous id algorithm. A SHARE DATA: New user has to get AID from admin. Admin will assign that AID for every node. So data shared by user can be kept in a sharable database and it can be shared by all users. Each node will have unique AID with the help of that unique AID any user can store and retrieve from sharable database. B RETRIEVE SHARED DATA: In this module user can retrieve the shared data. Shared data may be stored by him or by any other node. So it will be easy to make own private data as secret by implementing anonymous id algorithm. Secure sum Algorithm Given nodes each holding an data item from a finitely represent able abelian group, share the value among the nodes without revealing the values . 1) Each node , chooses random values such that ri,1+…ri,N = di 2) Each “random” value is transmitted from node to node . The sum of all these random numbers is, ofcourse, the desired total . 3) Each node totals all the random values received as: si,j = r1,j+…+ rN,j 4) Now each node simply broadcasts to all other nodes so that each node can compute: T = s1 +…sN AIDA Algorithm Implementation: Given nodes n1,…,nN, use distributed computation (without central authority) to find an anonymous indexing permutation s : {1,…,N} {1,…,N}. 1) Set the number of assigned nodes A = 0. 2) Each unassigned node chooses a random number in the range 1 to S. A node assigned in a previous round chooses r1 = 0. 3) The random numbers are shared anonymously. Denote the shared values by q1,…,qN. 4) Let q1,…,qk denote a revised list of shared values with duplicated and zero values entirely removed where k is the number of unique random values. The nodes ni which drew unique random numbers then determine their index si from the position of their random number in the Proceedings of International Conference on Developments in Engineering Research ISBN NO : 378 - 26 - 13840 - 9 www.iaetsd.in INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT 113
  • 4. revised list as it would appear after being sorted: si = A + Card{qj : qj <=ri} 5) Update the number of nodes assigned: . 6) If A < N then return to step (2). Basic formula P (collision) =1-e^(-N^2/(2*H))=alpha N=sqrt (2*ln (1/1-alpha))*sqrt (H) N: number of evenly distributed hashes to compare H: the Size of the element count of all possible hashes H=2^ (IDlength *ln (36)/ln (2)) Hashes calculated with SHAI (IDlength<=30). K.Communications Requirements of AIDA Methods Consider the required number of data bits for each of the three variant methods just described. This is the number of data bits that would be transmitted in each packet by the secure sum algorithm introduced earlier. The required numbers of data bits B are slightly overestimated by the formulae: = N. [ 2(P+1)] = N. [ 2(N)] /2.[ 2(S)] = S. [ 2(N+1)] (2) The computational requirements of the “slot selection” appear, at first, to be trivial. However, for every root that the “prime modulus” method must check, “slot selection”. L. The Completion Rate after R Rounds Two nodes might make identical choices of random numbers, or slots as they will be termed in this section. One can only guarantee that a complete assignment of nodes using possibilities for slots or random number choices and rounds will occur with at least a desired probability. The formulae are derived by assuming that N -1 node have chosen slots and looking at the next choice. The Nth node into choose a slot resulting in assignments and conflicts. The slot it chooses could be unassigned, already in conflict with multiple occupants, or already assigned with exactly one occupant. III. EXPERIMENTAL RESULTS SI.NO N H P 1 189 45 390 2 210 55 400 3 290 95 442 4 549 225 667 5 999 455 1109 Table 1: Anonymous ID creation Algorithm Results are given in terms of identities. N represents the number of evenly distributed hashes to compare. H indicates the size of the element count of all possible hashes. P Indicates the value of anonymous ID. This is unique to every members of the group. Anonymous ID received is unknown to other members of the group. Anonymous id is examined between communication and computational requirement. IV. CONCLUSION Proposed paper greatly decreases communication overhead. By using private communication channel that is anonymity router to transmit the data more securely. To overcome the problem of identifying details and changing information anonymous id was utilized. Random serial number is used to identify whether the data requesting person is a correct authorized person or hackers. The use of the Newton identities greatly decreases communication overhead. This can enable the use of a larger number of “slots” with a consequent reduction in the number of rounds required. Proceedings of International Conference on Developments in Engineering Research ISBN NO : 378 - 26 - 13840 - 9 www.iaetsd.in INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT 114
  • 5. The solution of a polynomial can be avoided at some expense by using Sturm’s theorem. The development of a result similar to the Sturm’s method over a finite field is an enticing possibility. With private communication channels, the algorithms are secure in an information theoretic sense. Apparently, this property is very fragile. The very similar problem of mental poker was shown to have no such solution with two players and three cards. The argument can easily be extended to, e.g., two sets each of N colluding players with a deck of 2N+1 cards rather than our deck of 2N cards. In contrast to bounds on completion time developed in previous works, our formulae give the expected completion time exactly. All of the no cryptographic algorithms have been extensively simulated, and the present work does offer a basis upon which implementations can be constructed. The communications requirements of the algorithms depend heavily on the underlying implementation of the chosen secure sum algorithm. In some cases, merging the two layers could result in reduced overhead. REFERENCES [1] Sarbanes–Oxley Act of 2002, Title 29, Code of Federal Regulations,Part 1980, 2003. [2] Y.Zhang, W.Liu, and W.Lou .Anonymous communications in mobile ad hoc networks. In INFOCOM 2005, 24th annual joint conference the IEEE Computer Societies. Proceeding IEEE, volume 3, pages 1940– 1951, March 2005. [3] D. Chaum, “Untraceable electronic mail, return address and digital pseudonyms,” Commun. ACM, vol. 24, no. 2, pp. 84–88, Feb.1981. [4] C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu, “Tools for privacy preserving distributed data mining,” ACM SIGKDD Explorations Newsletter, vol. 4, no. 2, pp. 28–34, Dec. 2002. [5] J. Wang, T. Fukasama, S. Urabe, and T.Takata, “A collusion-resistant approach to privacy-preserving distributed data mining,” IEICE Trans.Inf.Syst. (Inst. Electron. Inf. Commun. Eng.), vol. E89-D, no. 11, pp.2739– 2747, 2006. [6] F. Baiardi, A. Falleni, R. Granchi, F. Martinelli, M. Petrocchi, and A.Vaccarelli, “Seas, a secure e-voting protocol: Design and implementation,” Comput. Security, vol. 24, no. 8, pp. 642–652, Nov. 2005. [7] Sanil, A. P., Karr, A. F., Lin, X., and Reiter, J. P. (2007). Privacy preserving analysis of vertically partitioned data using secure matrix products. [8] J. Kong and X. Hong. Anodr: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. InMobihoc’03: Proceedings of the 4th ACM international symposium on Mobile ad hoc networking ages 291–302, New York, NY, USA,2003. [9] J. Yoon and H. Kim, “A new collision-free pseudonym scheme in mobile ad hoc networks,”5th workshop on Resource allocation, Cooperation and competition in wireless networks. June 2009. Proceedings of International Conference on Developments in Engineering Research ISBN NO : 378 - 26 - 13840 - 9 www.iaetsd.in INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT 115
  • 6. [10] A. Friedman, R. Wolff, and A. Schuster, “Providing k-anonymity in data mining,” VLDB Journal, vol. 17, no. 4, pp. 789–804, Jul. 2008. [11] J. Domingo-Ferrer, “A new privacy homomorphism and applications,” Information Processing Letters, vol. 60, no. 5, pp. 277–282, December1996.[Online]. Available: citeseer.nj.nec.com/290190.html [12] J. Domingo-Ferrer, “A provably secure additive and multiplicative privacy homo morphishm,” in Information Security, ser. Lecture Notes in Computer Science, A. Chan and V. Gligor, Eds., vol. 2433. Springer Verlag, 2002, pp. pp. 471–483. [13] D. M. Goldschlag,M. G. Reed, and P. F. Syverson, “Hiding routing information,” inProc. Information Hiding, 1996, pp. 137150,Springer Verlag [14] A. Karr, “Secure statistical analysis of distributed databases, emphasizing what we don’t know,” J. Privacy Confidentiality, vol. 1, no.2,pp. 197–211, 2009. [15] Q. Xie and U. Hengartner, “Privacy- preserving matchmaking for mobile social networking secure against malicious users,” in Proc. 9thAnn. IEEE Conf. Privacy, Security and Trust, Jul. 2011, pp. 252–259. Proceedings of International Conference on Developments in Engineering Research ISBN NO : 378 - 26 - 13840 - 9 www.iaetsd.in INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT 116