Noise addition for anonymisation is a known technique for increasing the privacy of a data sets. However this technique is often presented as individual and independent, or, just stated as techniques to be applied. This increases the danger of
misapplication of these techniques and a resulting anonymised data set that is open to relatively easy re-identification or reconstruction. To better understand the application of these techniques we demonstrate their application to a specific domain - that of network trace anonymisation.
Prevention of Packet Hiding Methods In Selective Jamming AttackIJCERT
The sharing nature of wireless medium provides various challenging features among various set of users. It is very important in real world and it provides better transfer rate but authentication is ignored. The limitations of existing wired network are overcome by wireless network. These networks act as source for various types of jamming attacks. In analysis and detection of jamming attack various methods are available but sometime they fail. In case of external threat the analysis and reporting of jamming attack is very easy model but it is quite difficult in terms of internal threat model, these internal term uses the knowledge about network secrets and network protocols to launch various attacks with very low effort. Various cryptographic techniques are implemented to prevent these attacks. The main goal of this project is to prevent the information at the wireless physical layer and allowed the safe transmission among communicated nodes although the attacker is present.
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map cscpconf
Data security is one of major challenges in the recent literature. Cryptography is the most
common phenomena used to secure data. One main aspect in cryptography is creating a hard to
guess cipher. Artificial Neural Networks (ANN) is one of the machine learning techniques
widely employed in several fields based on its characters, depending on the application area.
One of these fields is data security. The state of art in this paper is the use of self organizing
map (SOM) algorithm concept as a core idea to construct a pad; this pad is used to generate the
cipher at one end. At the other end of communication the same process is synchronized to
generate the same pad as the deciphering key. The security of the proposed model depends on
the complex nature of ANN's. The algorithm could be categorized under symmetric
cryptography, merging both stream and block cipher. A modified version of the same algorithm
also presented employs permutation and variable SOM neighborhoods. The proposal can be
applied over several file formats like videos, images, text files, data benchmarks, etc as show in
experimental results
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELijsptm
Data exchange and data publishing are becoming an important part of business and academic practices.
Data owners need to maintain the rights over the datasets they share. A right-protection mechanism can be
provided for the ownership of shared data, without revealing its usage under a wide range of machine
learning and mining. In the approach provide two algorithms: the Nearest-Neighbors (NN) and determiner
preserves the Minimum Spanning Tree (MST). The K-NN protocol guarantees that relations between object
remain unaltered. The algorithms preserve the both right protection and utility preservation. The rightprotection
scheme is based on watermarking. Watermarking methodology preserves the distance
relationships.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Review on Encrypted Image with Hidden Data Using AES AlgorithmEECJOURNAL
Steganography is the art of hiding the fact where communication is taking place, by hiding information in other information. Steganography becomes more important as more people join the cyberspace revolution. . In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. Steganography include an array of secret communication methods that hide the message from being seen or discovered. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. In addition to this our project also adds security to both the data hidden and the image that carries the information. Security is provided by Encrypting the data that is sent in the image and again encrypting the image that carries the information using AES algorithm. This encryption of the data and image thus provides double security layer.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Prevention of Packet Hiding Methods In Selective Jamming AttackIJCERT
The sharing nature of wireless medium provides various challenging features among various set of users. It is very important in real world and it provides better transfer rate but authentication is ignored. The limitations of existing wired network are overcome by wireless network. These networks act as source for various types of jamming attacks. In analysis and detection of jamming attack various methods are available but sometime they fail. In case of external threat the analysis and reporting of jamming attack is very easy model but it is quite difficult in terms of internal threat model, these internal term uses the knowledge about network secrets and network protocols to launch various attacks with very low effort. Various cryptographic techniques are implemented to prevent these attacks. The main goal of this project is to prevent the information at the wireless physical layer and allowed the safe transmission among communicated nodes although the attacker is present.
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map cscpconf
Data security is one of major challenges in the recent literature. Cryptography is the most
common phenomena used to secure data. One main aspect in cryptography is creating a hard to
guess cipher. Artificial Neural Networks (ANN) is one of the machine learning techniques
widely employed in several fields based on its characters, depending on the application area.
One of these fields is data security. The state of art in this paper is the use of self organizing
map (SOM) algorithm concept as a core idea to construct a pad; this pad is used to generate the
cipher at one end. At the other end of communication the same process is synchronized to
generate the same pad as the deciphering key. The security of the proposed model depends on
the complex nature of ANN's. The algorithm could be categorized under symmetric
cryptography, merging both stream and block cipher. A modified version of the same algorithm
also presented employs permutation and variable SOM neighborhoods. The proposal can be
applied over several file formats like videos, images, text files, data benchmarks, etc as show in
experimental results
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELijsptm
Data exchange and data publishing are becoming an important part of business and academic practices.
Data owners need to maintain the rights over the datasets they share. A right-protection mechanism can be
provided for the ownership of shared data, without revealing its usage under a wide range of machine
learning and mining. In the approach provide two algorithms: the Nearest-Neighbors (NN) and determiner
preserves the Minimum Spanning Tree (MST). The K-NN protocol guarantees that relations between object
remain unaltered. The algorithms preserve the both right protection and utility preservation. The rightprotection
scheme is based on watermarking. Watermarking methodology preserves the distance
relationships.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Review on Encrypted Image with Hidden Data Using AES AlgorithmEECJOURNAL
Steganography is the art of hiding the fact where communication is taking place, by hiding information in other information. Steganography becomes more important as more people join the cyberspace revolution. . In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. Steganography include an array of secret communication methods that hide the message from being seen or discovered. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. In addition to this our project also adds security to both the data hidden and the image that carries the information. Security is provided by Encrypting the data that is sent in the image and again encrypting the image that carries the information using AES algorithm. This encryption of the data and image thus provides double security layer.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Secure multipath routing scheme using keyijfcstjournal
Multipath routing in WSN has been a long wish in security scenario where nodes on next-hop may be
targeted to compromise. Many proposals of Multipath routing has been proposed in ADHOC Networks but
under constrained from keying environment most seems ignorant. In WSN where crucial data is reported by
nodes in deployment area to their securely located Sink, route security has to be guaranteed. Under
dynamic load and selective attacks, availability of multiple secure paths is a boon and increases the
attacker efforts by many folds. We propose to build a subset of neighbors as our front towards destination
node. We also identified forwarders for query by base station. The front is optimally calculated to maintain
the security credential and avail multiple paths. According to our knowledge ours is a novel secure
multipath routing protocol for WSN. We established effectiveness of our proposal with mathematical
analysis.
Name a naming mechanism for delay disruption tolerant networkIJCNCJournal
This paper presents the design and implementation of the naming mechanism (NAME), a resource
discovery and service location approach for Delay/Disruption-Tolerant Network (DTN). First discuss the
architecture of NAME mainly including Name Knowledge Base, Name Dissemination, Name Resolution
and Name-based Routing. In the design and implementation of NAME, we introduce the simple namespecifiers
to describe name, the name-tree for name storage and the efficient predicate-based routing
algorithm. Future work is finally discussed for completing NAME and providing APIs for abundant
applications.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
A Novel IP Traceback Scheme for Spoofing AttackIJAEMSJORNAL
Internet has been widely applied in various fields, more and more network security issues emerge and catch people’s attention. However, adversaries often hide themselves by spoofing their own IP addresses and then launch attacks. For this reason, researchers have proposed a lot of trace back schemes to trace the source of these attacks. Some use only one packet in their packet logging schemes to achieve IP tracking. Others combine packet marking with packet logging and therefore create hybrid IP trace back schemes demanding less storage but requiring a longer search. In this paper, we propose a new hybrid IP trace back scheme with efficient packet logging aiming to have a fixed storage requirement for each router in packet logging without the need to refresh the logged tracking information and to achieve zero false positive and false negative rates in attack-path reconstruction.
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGIJNSA Journal
Network security has become more important role today to personal users and organizations. Denial-of-
Service (DoS) and Distributed Denial-of-Service (DDoS) attacks are serious problem in network. The
major challenges in design of an efficient algorithm in data stream are one-pass over the input, poly-log
space, poly-log update time and poly-log reporting time. In this paper, we use strongly explicit construction
d-disjunct matrices in Non-adaptive group testing (NAGT) to adapt these requirements and propose a
solution for fast detecting DoS and DDoS attacks based on NAGT approach
File Encryption and Hiding Application Based on AES and Append Insertion Steg...TELKOMNIKA JOURNAL
Steganography is a method of hiding secret message in other innocuous looking object so that
its presence is not revealed. In this paper, a message, which is a computer file of any type and size, is
hidden in a selected cover or carrier, which is a computer file of certain types. The steganography method
used in this paper is called append insertion steganography method. This method is chosen as an attempt
to remove the limitation of message format, which appears in many popular steganography methods. To
scramble the meaning of the hidden message, AES-256 (Rijndael algorithm) is used to encrypt the
message with a secret passphrase. A special block of bytes is used to identify and verify the original
message so it can be recovered while retaining its integrity. The C# programming language and .NET
Framework are chosen to implement the algorithm into a Windows application. In this paper, one cover file
contains exactly one message file. In the testing, five random files are used as secret message. Their
integrity is calculated using SHA-256 before hiding and after recovery. In the testing, they all retain their
integrity, proven by exact hash values. Thus, the application as the implementation of proposed algorithm
is proven feasible but only for personal use as some improvements still have to be implemented.
Bluetooth technology is an emerging wireless networking standard, which is based on chip that provides short-range wireless frequency hopping communication. Now, Bluetooth technology is mainly applied to the communication between mobile terminal devices, such as palm computers, mobile phones, laptops and so on. However, the phenomenon of data-leaking frequently arises in using the Bluetooth technology for data transfer. To enhance the security of data transmission in Bluetooth communication, a hybrid encryption algorithm based on DES and RSA is proposed. The currently used encryption algorithm employed by the Bluetooth to protect the confidentiality of data during transport between two or more devices is a 128-bit symmetric stream cipher called E0. The proposed hybrid encryption algorithm, instead of the E0 encryption, DES algorithm is used for data transmission because of its higher efficiency in block encryption, and RSA algorithm is used for the encryption of the key of the DES because of its management advantages in key cipher. Under the dual protection with the DES algorithm and the RSA algorithm, the data transmission in the Bluetooth system will be more secure. This project is extended with triple des in place of des to enhance more security.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
A Novel Steganography Technique that Embeds Security along with CompressionCSCJournals
Problem faced by today’s communicators is not only security but also the speed of communication. This paper provides a mechanism that increases the speed of communication by reducing the size of content; for this data compression method is used and security factor is added by using Steganography. Firstly, the focus has been made on Data Compression and Steganography. Finally, proposed technique has been discussed. In Proposed technique first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter on compressed data state table operation is applied to improve the security. Then, this is used as the input to the LSB technique of Steganography. At receiver end, firstly the LSB extraction technique is used, thereafter the state table operation in reverse form is applied and finally the original data is obtained. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.
Privacy Preserving Log File Processing in Mobile Network EnvironmentShankar Lal
Noise addition for anonymisation is a known technique for increasing the privacy of a data sets. However this technique is often presented as individual and independent, or, just stated as techniques to be applied. This increases the danger of misapplication of these techniques and a resulting anonymised data set that is open to relatively easy re-identification or reconstruction. To better understand the application of these techniques we demonstrate their application to a specific domain - that of network trace anonymisation.
If you are one of the nearly 13 million taxpayers who asked for more time to file your federal tax return this year, the extra time is about to expire. If you haven’t yet filed do soon, and have these points in mind while filing.
Secure multipath routing scheme using keyijfcstjournal
Multipath routing in WSN has been a long wish in security scenario where nodes on next-hop may be
targeted to compromise. Many proposals of Multipath routing has been proposed in ADHOC Networks but
under constrained from keying environment most seems ignorant. In WSN where crucial data is reported by
nodes in deployment area to their securely located Sink, route security has to be guaranteed. Under
dynamic load and selective attacks, availability of multiple secure paths is a boon and increases the
attacker efforts by many folds. We propose to build a subset of neighbors as our front towards destination
node. We also identified forwarders for query by base station. The front is optimally calculated to maintain
the security credential and avail multiple paths. According to our knowledge ours is a novel secure
multipath routing protocol for WSN. We established effectiveness of our proposal with mathematical
analysis.
Name a naming mechanism for delay disruption tolerant networkIJCNCJournal
This paper presents the design and implementation of the naming mechanism (NAME), a resource
discovery and service location approach for Delay/Disruption-Tolerant Network (DTN). First discuss the
architecture of NAME mainly including Name Knowledge Base, Name Dissemination, Name Resolution
and Name-based Routing. In the design and implementation of NAME, we introduce the simple namespecifiers
to describe name, the name-tree for name storage and the efficient predicate-based routing
algorithm. Future work is finally discussed for completing NAME and providing APIs for abundant
applications.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
A Novel IP Traceback Scheme for Spoofing AttackIJAEMSJORNAL
Internet has been widely applied in various fields, more and more network security issues emerge and catch people’s attention. However, adversaries often hide themselves by spoofing their own IP addresses and then launch attacks. For this reason, researchers have proposed a lot of trace back schemes to trace the source of these attacks. Some use only one packet in their packet logging schemes to achieve IP tracking. Others combine packet marking with packet logging and therefore create hybrid IP trace back schemes demanding less storage but requiring a longer search. In this paper, we propose a new hybrid IP trace back scheme with efficient packet logging aiming to have a fixed storage requirement for each router in packet logging without the need to refresh the logged tracking information and to achieve zero false positive and false negative rates in attack-path reconstruction.
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGIJNSA Journal
Network security has become more important role today to personal users and organizations. Denial-of-
Service (DoS) and Distributed Denial-of-Service (DDoS) attacks are serious problem in network. The
major challenges in design of an efficient algorithm in data stream are one-pass over the input, poly-log
space, poly-log update time and poly-log reporting time. In this paper, we use strongly explicit construction
d-disjunct matrices in Non-adaptive group testing (NAGT) to adapt these requirements and propose a
solution for fast detecting DoS and DDoS attacks based on NAGT approach
File Encryption and Hiding Application Based on AES and Append Insertion Steg...TELKOMNIKA JOURNAL
Steganography is a method of hiding secret message in other innocuous looking object so that
its presence is not revealed. In this paper, a message, which is a computer file of any type and size, is
hidden in a selected cover or carrier, which is a computer file of certain types. The steganography method
used in this paper is called append insertion steganography method. This method is chosen as an attempt
to remove the limitation of message format, which appears in many popular steganography methods. To
scramble the meaning of the hidden message, AES-256 (Rijndael algorithm) is used to encrypt the
message with a secret passphrase. A special block of bytes is used to identify and verify the original
message so it can be recovered while retaining its integrity. The C# programming language and .NET
Framework are chosen to implement the algorithm into a Windows application. In this paper, one cover file
contains exactly one message file. In the testing, five random files are used as secret message. Their
integrity is calculated using SHA-256 before hiding and after recovery. In the testing, they all retain their
integrity, proven by exact hash values. Thus, the application as the implementation of proposed algorithm
is proven feasible but only for personal use as some improvements still have to be implemented.
Bluetooth technology is an emerging wireless networking standard, which is based on chip that provides short-range wireless frequency hopping communication. Now, Bluetooth technology is mainly applied to the communication between mobile terminal devices, such as palm computers, mobile phones, laptops and so on. However, the phenomenon of data-leaking frequently arises in using the Bluetooth technology for data transfer. To enhance the security of data transmission in Bluetooth communication, a hybrid encryption algorithm based on DES and RSA is proposed. The currently used encryption algorithm employed by the Bluetooth to protect the confidentiality of data during transport between two or more devices is a 128-bit symmetric stream cipher called E0. The proposed hybrid encryption algorithm, instead of the E0 encryption, DES algorithm is used for data transmission because of its higher efficiency in block encryption, and RSA algorithm is used for the encryption of the key of the DES because of its management advantages in key cipher. Under the dual protection with the DES algorithm and the RSA algorithm, the data transmission in the Bluetooth system will be more secure. This project is extended with triple des in place of des to enhance more security.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
A Novel Steganography Technique that Embeds Security along with CompressionCSCJournals
Problem faced by today’s communicators is not only security but also the speed of communication. This paper provides a mechanism that increases the speed of communication by reducing the size of content; for this data compression method is used and security factor is added by using Steganography. Firstly, the focus has been made on Data Compression and Steganography. Finally, proposed technique has been discussed. In Proposed technique first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter on compressed data state table operation is applied to improve the security. Then, this is used as the input to the LSB technique of Steganography. At receiver end, firstly the LSB extraction technique is used, thereafter the state table operation in reverse form is applied and finally the original data is obtained. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.
Privacy Preserving Log File Processing in Mobile Network EnvironmentShankar Lal
Noise addition for anonymisation is a known technique for increasing the privacy of a data sets. However this technique is often presented as individual and independent, or, just stated as techniques to be applied. This increases the danger of misapplication of these techniques and a resulting anonymised data set that is open to relatively easy re-identification or reconstruction. To better understand the application of these techniques we demonstrate their application to a specific domain - that of network trace anonymisation.
If you are one of the nearly 13 million taxpayers who asked for more time to file your federal tax return this year, the extra time is about to expire. If you haven’t yet filed do soon, and have these points in mind while filing.
Hiding message from hacker using novel network techniquesPriyangaRajaram
we address the trouble of selective jamming attacks in wireless networks. In these assaults, the adversary is energetic best for a brief period of time, selectively concentrated on messages of excessive significance. We illustrate the benefits of selective jamming in phrases of network performance degradation and adversary effort with the aid of offering case research. A selective assault on TCP and one on routing. We show that selective jamming attacks can be launched with the aid of performing actual-time packet classification at the physical layer. To mitigate these attacks, we develop 3 schemes that prevent actual-time packet class via combining cryptographic primitives with physical-layer attributes. We analyze the security of our strategies and examine their computational and communication overhead.
Efficient security approaches in mobile ad hoc networks a surveyeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A novel cloud storage system with support of sensitive data applicationijmnct
Most users are willing to store their data in the c
loud storage system and use many facilities of clou
d. But
their sensitive data applications faces with potent
ial serious security threats. In this paper, securi
ty
requirements of sensitive data application in the c
loud are analyzed and improved structure for the ty
pical
cloud storage system architecture is proposed. The
hardware USB-Key is used in the proposed architectu
re
for purpose of enhancing security of user identity
and interaction security between the users and the
cloud
storage system. Moreover, drawn from the idea of da
ta active protection, a data security container is
introduced in the system to enhance the security of
the data transmission process; by encapsulating th
e
encrypted data, increasing appropriate access contr
ol and data management functions. The static data
blocks are replaced with a dynamic executable data
security container. Then, an enhanced security
architecture for software of cloud storage terminal
is proposed for more adaptation with the user's sp
ecific
requirements, and its functions and components can
be customizable. Moreover, the proposed architectur
e
have capability of detecting whether the execution
environment is according with the pre-defined
environment requirements.
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
Abstract: In this research paper ,we developed a model for a large network, wireless nodes are interconnected and each can be considered as a node processor that offer services to other node processors connected to a specific network. A very high proportion of the nodes that offer services need to carry out an authentication process so as to make an access request to the node offering the service. In this context, an integrated reconfigurable network security architecture moved to the application layer has become the need of the day for secure wireless data sharing. The security schemes of the seven layer OSI architecture need to be placed intrinsically in the wireless node itself and should be capable of supporting the MAC layer, IP address based layer and the routing protocols of the network layer. This work focuses on the use of emulator and embedded hardware architectures for wireless network security. In this work, the individual nodes can have a unique security signature pattern maintained by respective wireless nodes using an encryption algorithm and this is made dynamic. The metrics includes latency, throughput, Scalability, Effects of data transfer operation on node processor and application data located in the processor Keywords:Wireless Network security, Embedded hardware, Reconfigurable architecture, blowfish algorithm
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYcsandit
Rapid increase in data transmission over internet results in emphasis on information security.
Audio steganography is used for secure transmission of secret data with audio signal as the
carrier. In the proposed method, cover audio file is transformed from space domain to wavelet
domain using lifting scheme, leading to secure data hiding. Text message is encrypted using
dynamic encryption algorithm. Cipher text is then hidden in wavelet coefficients of cover audio
signal. Signal to Noise Ratio (SNR) and Squared Pearson Correlation Coefficient (SPCC)
values are computed to judge the quality of the stego audio signal. Results show that stego
audio signal is perceptually indistinguishable from the cover audio signal. Stego audio signal is
robust even in presence of external noise. Proposed method provides secure and least error
data extraction.
An Effective Semantic Encrypted Relational Data Using K-Nn ModelClaraZara1
Data exchange and data publishing are becoming an important part of business and academic practices. Data owners need to maintain the rights over the datasets they share. A right-protection mechanism can be provided for the ownership of shared data, without revealing its usage under a wide range of machine learning and mining. In the approach provide two algorithms: the Nearest-Neighbors (NN) and determiner preserves the Minimum Spanning Tree (MST). The K-NN protocol guarantees that relations between object remain unaltered. The algorithms preserve the both right protection and utility preservation. The right protection scheme is based on watermarking. Watermarking methodology preserves the distance relationships.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
In remote sensor arrange messages are exchanged between the different source and goal matches agreeably such way that multi-jump parcel transmission is utilized. These information bundles are exchanged from the middle of the road hub to sink hub by sending a parcel to goal hubs. Where each hub overhears transmission close neighbor hub. To dodge this we propose novel approach with proficient steering convention i.e. most brief way directing and conveyed hub steering calculation. Proposed work additionally concentrates on Automatic Repeat Request and Deterministic Network coding. We spread this work by the end to end message encoding instrument. To upgrade hub security match shrewd key era is utilized, in which combined conveying hub is allocated with combine key to making secure correspondence. End to end. We dissect both single and numerous hubs and look at basic ARQ and deterministic system coding as strategies for transmission.
Elgamal signature for content distribution with network codingijwmn
Network coding is a slightly new forwarding technique which receives various applications in traditional
computer networks, wireless sensor networks and peer-to-peer systems. However, network coding is
inherently vulnerable to pollution attacks by malicious nodes in the network. If any fake node in the
network spreads polluted packets, the pollution of packets will spread quickly since the output of (even an)
honest node is corrupted if at least one of the incoming packets is corrupted. There have been adapted a
few ordinary signature schemes to network coding that allows nodes to check the validity of a packet
without decoding. In this paper, we propose a scheme uses ElGamal signature in network coding. Our
scheme makes use of the linearity property of the packets in a coded system, and allows nodes to check the
integrity of the packets received easily.
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYcscpconf
Rapid increase in data transmission over internet results in emphasis on information security. Audio steganography is used for secure transmission of secret data with audio signal as the carrier. In the proposed method, cover audio file is transformed from space domain to wavelet domain using lifting scheme, leading to secure data hiding. Text message is encrypted using
dynamic encryption algorithm. Cipher text is then hidden in wavelet coefficients of cover audio signal. Signal to Noise Ratio (SNR) and Squared Pearson Correlation Coefficient (SPCC)
values are computed to judge the quality of the stego audio signal. Results show that stego audio signal is perceptually indistinguishable from the cover audio signal. Stego audio signal is robust even in presence of external noise. Proposed method provides secure and least error data extraction
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Utilisation of l-Diversity and Differential Privacy in the Anonymisation of Network Traces
1. Utilisation of -Diversity and Differential Privacy in the
Anonymisation of Network Traces
Shankar Lal
Aalto University, Finland
shankar.lal@aalto.fi
Ian Oliver, Yoan Miche
Security Research
Nokia Neworks, Finland
first.last@nokia.com
Abstract: Noise addition for anonymisation is a known technique for increasing the
privacy of a data sets. However this technique is often presented as individual and
independent, or, just stated as techniques to be applied. This increases the danger of
misapplication of these techniques and a resulting anonymised data set that is open to
relatively easy re-identification or reconstruction. To better understand the application
of these techniques we demonstrate their application to a specific domain - that of
network trace anonymisation.
1 Introduction
Privacy and especially anonymisation of data sets is a hot topic. It, therefore, comes as
no surprise that data sets such as network traces which contain large amounts of sensitive
information about the behavior of users on a network require such treatment.
Techniques such as suppression, hashing and encryption of fields suffice to a point. In
the case of suppression information is lost, while in hashing or encryption of data, the
information content is transformed, from say an IP address which identifies a particular
machine, into just some kind of generic identifier. In many cases a pattern of behavior
is still recognizable, for example, hashing source and target IP addresses still reveals a
unique pattern of communication if not the precise identities [1] [2].
More advanced techniques such as κ-anonymity [3], -diversity [4] and differential privacy
[5] (amongst others) have been developed; κ-anonymity in particular has been successfully
used with medical data. These techniques are now being recommended, if not mandated,
to be used in the process of anonymisation.
In this paper, we present techniques for anonymising network traces that preserve some de-
gree of statistical properties such that some meaningful analysis can still be made. Working
in this specific domain means that we can carefully tailor techniques such as differential
privacy such that a reasonable degree of privacy is assured.
2. 2 Network trace files
A network trace file contains sensitive fields such as source and destination IP addresses,
protocol type, packet lengths etc. Some of these can further act as quasi identifiers whose
combination can lead to the identification of an individual despite seemingly identifying
fields being removed or anonymised [6]. The source/destination IP address and time-stamp
field can disclose who is talking to whom and also provide proof that communication ex-
isted between the parties in certain period of time. Protocol field is crucial in the sense that
certain protocols can identify the nature of traffic.
Packet length field refers to the total length of an IP packet which includes payload and
header information. This field is also very important from the security point of view,
since certain security incidents have fixed packet length for example some network worms
i.e. Slammer worm and Nachi worm have fixed packet length of 404 bytes and 92 bytes
respectively [16] [10]. The packet length field is also vital in the sense that major transport
protocols like TCP and UDP, mostly have packets of larger length e.g. around 1500 bytes.
The other management protocols for example ICMP, DNS etc. have packet lengths mostly
fewer than 200 bytes. Therefore due to this structure of the fields, it, sometime, can be
easy to guess the protocol type by checking its packet length.
3 Overview of anonymisation techniques
Data anonymity can not be ensured by employing any single anonymisation technique
as each technique has its advantages and disadvantages. All data sets are required to
be processed through any combination of the techniques presented here and the many
variations thereof [7].
3.1 Differential Privacy
The notion of adding noise and randomized values to the data in a controlled manner is
known as differential privacy and provides a technique suited to continuous data sets such
as location data, or in our case, data such as packet length and time-stamp data.
Consider two neighboring data sets D1, D2. The neighboring data sets are the data sets
which differ only from one entry, one row or one record. They produce output S when
mechanism K which satisfies -differential privacy, is applied. The mechanism K can be
a randomized function to add jitter to some data field, fulfills the condition about the in-
formation disclosure related to any individual. Differential privacy algorithm states that
probability of data set D1 producing output S is nearly the same as the probability of data
set D2 producing same output.
3. Dwork’s [5] definition of differential privacy is following:
A mechanism K satisfies -differential privacy if for all pairs of adjacent databases D and
D , and all S ⊆ Range(K),
Pr[K(D ) ∈ S] ≤ e × Pr[K(D ) ∈ S] (1)
Here, is known as privacy parameter. The -value corresponds to the strength of the
privacy, smaller value of usually returns better privacy. Differential privacy uses Laplace
noise which is calculated by following formula ∆f / .
Where ∆f is the sensitivity of the function and defined as the maximum amount the out-
puts that can be perturbed by adding or removing some records from the data sets. This
measures how much output can be altered if a response is either included or excluded from
the result. To get an idea about the value of sensitivity, if a data set is queered that ’how
many rows have certain property, will yield sensitivity value of 1’. In our network trace,
we first generate query that ”what is the value of packet length/time-stamp field” which
gives us sensitivity value as 1 and then we add Laplace noise to the queried field using
suitable -value.
3.2 -diversity
The technique of -diversity involves partitioning fields within the data set such that within
each group there exists a balanced representation [8]. This addresses a number of weak-
nesses in the κ-anonymity techniques such as homogeneity attacks [9].
The discrete field in network trace such as protocol is also sensitive and need to be anonymised.
For example, some specific protocols like BitTorrent used for file sharing or UDP mostly
used for video streaming, can possibly identify the nature of traffic. Machanavajjhala et
al. [4] define -diversity principle as:
”A q-block is -diverse if contains at least ”well-represented” values for the sensitive
attribute S. A table is -diverse if every q-block is -diverse.”
4 Implementation of anonymisation techniques
In this section we apply the Differential Privacy and -diversity techniques to a network
trace along with guidelines on how the techniques are to be applied in this domain.
4. 4.1 Differential Privacy over Continuous Fields
Differential privacy is suitable for continuous numerical fields so we add random Laplace
noise to time-stamp and packet length field in our network trace. We have tried range of
different values of to obfuscate data fields but for the sake of simplicity, we present the
result based on two values in this paper. We first select value as 0.01 and plot histogram
of both original and obfuscated data of time-stamp and packets length field and then we
again plot the same histogram with value as 0.1 and compare both distributions. In figure
1 and 2, blue bars represents the original distribution of the data and green bars represent
distribution of obfuscated data.
(a) Length Distribution with = 0.1 (b) Length Distribution with = 0.01
Figure 1: Packet Length Distributions
From the figure 1(b) and 2(b), we can infer that noise magnitude with = 0.01 has heavily
modified the data and the obfuscated data does not follow the distribution of the original
data any more. This type of noise destroys the useful features of the data and makes
statistical analysis useless. While, as seen in figure 1(a) and 2(a), noise addition with =
0.1 produce the identical distribution as the original one and implies that even if individual
records of the data are perturbed but overall distribution of the data is preserved.
(a) Packet Frequency with Noise, = 0.1 (b) Packet Frequency with Noise, = 0.01
Figure 2: Time-stamp Distribution
5. The box plot in figure 3 compares the statistical parameters of original data and set of
obfuscated data with different -value. It can be seen in figure 3 that obfuscated packet
length field with -values 0.1 maintains almost similar features of the box plot such as
Minimum, Maximum, Median, Q1 and Q3 values. In our experiment, it turned out that
value of 0.1 is the most suitable for our network trace.
Figure 3: Distribution Spread of Packet Length
4.2 -Diversity over Discrete Fields
Protocol field can be grouped in a family equivalence class, where family name represents
the characteristics of its members. To create the protocol equivalence classes, we first
examine the type of protocols present in the network trace and then we group protocols
of similar functionalities and put them in their respective equivalence class. In order to
obfuscate the protocol field, we can replace it with its equivalence class name. The benefit
of doing so is to avoid any inference attack which might occur if original protocol field is
exposed.
6. Our anonymised network trace consist of 5 equivalence classes namely Transport pro-
tocols, Management protocols, Security protocols, Mobile network protocols and other
protocols. Each equivalence class contains protocols with similar functionalities for ex-
ample major transport protocols such as TCP and UDP are placed in Transport protocol
equivalence class. Although, replacing the protocol field with its equivalence class ruins
some amount of data but still provides enough information about the types of protocol,
being anonymised, this is actually the trade-off between privacy and data utility.
After replacing the original protocol field with its respective equivalence class, the per-
centage of each equivalence class present in anonymised trace can easily be calculated and
plotted using pie chart as shown in Figure 4. Figure 5 presents one sample of 5-diverse
network trace with each block of data containing 5 diverse values of equivalence class.
Figure 4: Protocol Equivalence Class Distribution
4.3 IP address anonymisation
There exist a number of ways to anonymise IP addresses. Traditionally, IP address are
anonymised by using hashing methods or converting them to some real number. The
problem with these methods is that they do not provide any means to carry out statistical
analysis over anonymised IP addresses.
We tried two different methods to anonymise IP addresses. First method suppresses the last
octet of the IP address while keeping other octets as intact e.g. 192.168.1.∗. This technique
7. Figure 5: A sample of 5-diverse anonymised network trace
ensures that user who generated the data packet cannot be traced back while on the other
hand provides information about the network topology which might be useful in certain
analysis. In the second method, we replaced IP addresses with their corresponding class
type for example IP address 192.168.1.10 is replaced by Class C and so on. Although, this
technique ruins the information about the network ID and subnet mask but still provides
some knowledge about IP address class and range of the addresses.
5 Clustering analysis of obfuscated data
In this section, we experiment with the obfuscated data obtained after applying above
anonymisation techniques to observe its usefulness. This experiment uses packet flow
records calculated from obfuscated data which become available for clustering.
8. Flow statistics [11], [12] are a set of measurements of the traffic data. Analyzing the traffic
at the flow level (and not at the packet level) allows for several types of analysis, typically
usage-based charging, network anomaly detection, identification of the heavy users, etc.
In practice, and for on-line systems and analysis, there is usually a mandatory sampling of
the packets, as direct measurement at the flow level on a high-speed link is not possible in
terms of CPU requirements, as well as memory and storage matters. Ideally, one would
want to use all packet data to compute the flows for higher precision of the calculated
statistics [13], [14]. In the case of this paper, this is actually possible, as we only consider
off-line network traces for the experiment presented. We have used a NetMate-flowcalc
based approach, the software is named flowtbag, which is specifically designed for off-line
flow statistics extraction.
5.1 Practicalities about data processing
The overall methodology for this clustering-based analysis is described on Figure 6, and
in more details in the following.
Figure 6: Overall block diagram of the data processing flow used.
Given a certain network traffic interface G, the traffic passing through this interface over
a certain period of time ∆t is sent to a computer running WireShark (latest development
version) and dumping the traffic G(∆t) to a PCAP file F.
This PCAP data file F is then sent directly to flow statistics extraction, which will compute
features that are directly usable for clustering. The resulting clustering is denoted Clus(F).
The very same file F is also run through a set of functions, each of which is parametrized by
θ, and will obfuscate some of the data, leading to the file Fθ. The θ parameter controls the
amount of obfuscation applied to the traffic data. The Fθ file then needs to be re-ordered,
if some noise has been applied to the time field of the PCAP records, as this will have put
the packets out of order, and therefore rendered this data unusable for computing the flow
statistics. The obfuscated data Fθ is re-ordered using the development version (1.99) of
WireShark 2, which allows for doing this directly on the PCAP file (using the associated
reorderpcap tool).
The re-ordered obfuscated PCAP file is then sent through the very same clustering as the
original file (non-obfuscated). This results in a certain clustering of the data which we will
denote Clus(Fθ).
9. 5.2 Remarks
Using flowtbag, on a Linux based computer with 6GB RAM, and i5-4300U@1.9GHz
CPU, we obtained the following processing speeds for a PCAP network trace:
• 14:7 secs to extract about 106124 packets for flow statistics;
• About 8200 packets/sec;
• About 0:00012 sec/packet.
Figure 7 (a) and (b) shows the effect of noise and -value on the flow records available for
clustering. It can be noted, from Figures 7 (a) that the number of available flow statistics
records for analysis depends heavily on the noise value used. Indeed, if the introduced
noise in the time-stamp of the packets is too large, the flow statistics, which are directly
based on this, become impossible to compute for a large amount of packets.
As expected, from Figure 7 (b), the dependency of the number of available flow records to
the value is almost non-existent, compared to that of the noise.
In order to have meaningful results for the clustering part, it is thus necessary to have
reasonable values for both the noise amount and . In the following experiment, is varied
to observe its influence on the clustering performed.
Figure 7: Overall block diagram of the data processing flow used.
10. Figure 8: Overall block diagram of the data processing flow used.
6 Discussion
In this paper, we have presented anonymisation techniques that can be applied specifically
in the network trace domain for the practice of anonymisation. Specifically we have em-
phasized on differential privacy and -diversity as these are lightly used for any anonymi-
sation (with respect to privacy) and also being techniques that are being promoted by the
privacy community.
One of the dangers of any type of anonymisation techniques is that techniques are ei-
ther applied to single fields, ignoring the presence of functional dependencies and quasi-
identifiers, or are applied without context to the semantics domain of the data. In this paper
we have shown the application of differential privacy and -diversity to obfuscate data in
the network trace domain.
As plain statistical analysis is just one mechanism for understanding the underlying data,
so machine learning provides a more sophisticated manner in which re-identification might
be made. While this work is still at a relatively early stage and understanding of how
differential privacy and other forms of noise addition techniques effect some analysis such
as clustering, will become critical to preserve privacy.
Acknowledgements
This paper was partially funded by the TEKES CyberTrust Programme.
11. References
[1] C. C. Aggarwal and P. S. Yu, A general survey of privacy-preserving data mining models
and algorithms, in Privacy-Preserving Data Mining, ser. The Kluwer International Series on
Advances in Database Systems, C. C. Aggarwal, P. S. Yu, and A. K. Elmagarmid, Eds. Springer
US, 2008, vol. 34, pp. 1152.
[2] P. Langendorfer, M. Maaser, K. Piotrowski, and S. Peter, ”Privacy Enhancing Techniques: A
Survey and Classification.” Information Science Reference, 2008.
[3] L. Sweeney, ”κ-anonymity: A model for protecting privacy” Int. J. Uncertain. Fuzziness
Knowl.-Based Syst., vol. 10, no. 5, pp. 557570, Oct. 2002.
[4] A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, ” -diversity: Privacy
beyond κ-anonymity, 2013 IEEE 29th International Conference on Data Engineering (ICDE),
vol. 0, p. 24, 2006.
[5] C. Dwork, ”Differential privacy: A survey of results, in Theory and Applications of Models of
Computation,” ser. Lecture Notes in Computer Science, vol. 4978. Springer Verlag, April 2008,
pp. 119.
[6] R. Motwani and Y. Xu, Efficient algorithms for masking and finding quasi-identifiers, in Pro-
ceedings of the Conference on Very Large Data Bases (VLDB), 2007.
[7] Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel, Unique in the Crowd: The
privacy bounds of human mobility, Scientific Reports, vol. 3, March 2013.
[8] N. Li and T. Li, t-closeness: Privacy beyond κ-anonymity and -diversity, in In Proc. of IEEE
23rd International Conference on Data Engineering (ICDE07
[9] A. Friedman, R. Wolff, and A. Schuster, Providing κ-anonymity in data mining, The VLDB
Journal, vol. 17, no. 4, pp. 789804, Jul. 2008.
[10] W. Yurcik, C. Woolam, G. Hellings, L. Khan, and B. M. Thuraisingham, Toward trusted
sharing of network packet traces using anonymization: Single-field privacy/analysis tradeoffs,
CoRR, vol. abs/0710.3979, 2007.
[11] S. Handelman, S. Stibler, N. Brownlee, and G. Ruth, RFC 2724: RTFM: New attributes for
traffic flow measurement, 1999. [Online]. Available: http://tools.ietf.org/html/rfc2724
[12] N. Brownlee, Network management and realtime traffic flow measurement,Journal of Network
and Systems Management, vol. 6, no. 2, pp. 223228, 1998.
[13] C. Estan and G. Varghese, New directions in traffic measurement and accounting, SIG-
COMM Comput. Commun. Rev., vol. 32, no. 4, pp. 323336, Aug. 2002. [Online]. Available:
http://doi.acm.org/10.1145/964725.633056
[14] N. Duffield, C. Lund, and M. Thorup, Properties and prediction of flowstatistics from sam-
pled packet streams, in In Proc. ACM SIGCOMM Internet Measurement Workshop, 2002, pp.
159171.
[15] S. Lloyd, Least squares quantization in pcm, Information Theory, IEEE Transactions on, vol.
28, no. 2, pp. 129137, Mar 1982
[16] Chen, Thomas M. ”Intrusion detection for viruses and worms.” IEC Annual Review of Com-
munications 57 (2004).