ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Enhanced Security for Two Party Confidential Data

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 5)

Publication Date:

Authors : ; ;

Page : 876-881

Keywords : Differential privacy; Two party algorithm; Sensitive score updation; Sha-2 algorithm.;

Source : Downloadexternal Find it from : Google Scholarexternal


Data mining is the process of extracting hidden predictive information from large databases to support decision making process. There may be a chance of revealing sensitive information stored in dataware house during extraction of hidden details. To protect this consequence a method is proposed to securely integrate person-speci?c sensitive data from two data providers, whereby the integrated data still retains the essential information for supporting data mining tasks. Most real-life scenarios are in need for simultaneous data sharing and privacy preservation of person sensitive data. Enhanced security for two party confidential data adopts differential privacy, provides a rigorous privacy model and makes no assumption about an adversary’s background knowledge.

Last modified: 2014-06-09 22:19:42