Security Through The Lens Of Privacy And Confidentiality Using K-Technique
Journal: International Journal of Scientific & Technology Research (Vol.3, No. 3)Publication Date: 2014-03-15
Authors : Sheedhal Thomas; Shruthi Prabhakaran; Snehal Salunkhe; Pallavi Kakade; B.S.Khade;
Page : 297-300
Keywords : Index Terms Anonymization; Authentication; Confidentiality; Cryptography; Decryption; Encryption; k-technique; Privacy; Security.;
Abstract
Abstract Suppose Alice owns a k-anonymous database and needs to determine whether her database when inserted with a tuple owned by Bob is still k-anonymous. Also suppose that access to the database is strictly controlled because for example data areused for certain experiments that need to be maintained confidential. Clearly allowing Alice to directly read the contents of the tuple breaks the privacy of Bob e.g. a patients medical record on the other hand the confidentiality of the database managed by Alice is violated once Bob has access to the contents of the database. Thus the problem is to check whether the database inserted with the tuple is still k-anonymous without letting Alice and Bob know the contents of the tuple and the database respectively. In this paper we propose two protocols solving this problem on suppression-based and generalization-based k-anonymous and confidential databases. The protocols rely on well-known cryptographic assumptions and we provide theoretical analyses to proof their soundness and experimental results to illustrate their efficiency.
Other Latest Articles
- Digital Image Forgery Detection Using Basic Manipulations In Facebook
- A Framework For Aggregating And Retrieving Relevant Information Using TF-IDF And Term Proximity In Support Of Maize Production
- Lipoleiomyoma Of The Uterine Cervix About An Observation
- Analysis Of Pressure Transverse Between Pump Stations Of Fula Pipeline Under Different Operation Scenarios
- Trust In The Internet As A Delivery Channel The Retail Banks Perspective
Last modified: 2015-06-28 03:53:46