Enhanced Security for Two Party Confidential Data
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 5)Publication Date: 2014-05-30
Authors : G. Sumathi; M.Indumathi;
Page : 876-881
Keywords : Differential privacy; Two party algorithm; Sensitive score updation; Sha-2 algorithm.;
Abstract
Data mining is the process of extracting hidden predictive information from large databases to support decision making process. There may be a chance of revealing sensitive information stored in dataware house during extraction of hidden details. To protect this consequence a method is proposed to securely integrate person-speci?c sensitive data from two data providers, whereby the integrated data still retains the essential information for supporting data mining tasks. Most real-life scenarios are in need for simultaneous data sharing and privacy preservation of person sensitive data. Enhanced security for two party confidential data adopts differential privacy, provides a rigorous privacy model and makes no assumption about an adversary’s background knowledge.
Other Latest Articles
- A Novel Fast Acquisition Method for L2C Code for GPS Based Radio Occulted Systems: A FPGA Based Implementation
- Accumulative distance based Optimization of Handover delay in LTE Femtocell Network
- Relativistic Computing Model Applied in Corporate Networks
- To Compare the Pulse Performance value on Multi User DS-CDMA System
- Performance of Open Core Gasifier with Briquette of different Crop Residues
Last modified: 2014-06-09 22:19:42