Preserve the Privacy of Anonymous and Confidential Database using K-anonymity

Abstract

In field of IT sector to maintain privacy and confidentiality of data is very important for decision making. So there is requirement of certain data to be published and exchanging of the information is in demand. The data to be exchanged contains sensitive information which moves around various parties and this may violate individual's privacy. So to preserve information in its accurate form while moving among various parties, my aim is to provide mechanism known as k_anonymous technique that doesn’t allow the unauthenticated user to modify the data. In this application two protocols that will solve this problem based on suppression and generalization k-anonymous and confidential databases are used. The protocols rely on well-known cryptographic assumptions, and it provides theoretical analyses to proof their experimental results to illustrate their efficiency.

Authors and Affiliations

Vishakha S. Kulkarni| M.E. Student, Dept. of Computer Science, Alard College of Engineering & Management, Pune, India, M. S. Gayathri| Asst.Professor, Dept.of Computer Science, Alard College of Engineering & Management, Pune, India

Keywords

Related Articles

Coverage Problem in Wireless Sensor Networks

Sensor network are highly distributed networks of small light weighted wireless nodes deployed in large numbers to monitor the environment or system by the measurement of physical parameters such as temperature, press...

Preserve the Privacy of Anonymous and Confidential Database using K-anonymity

In field of IT sector to maintain privacy and confidentiality of data is very important for decision making. So there is requirement of certain data to be published and exchanging of the information is in demand. The...

A Joint Design of Security and QOS Provisioning in MANET’s with Cooperative Communications

Cooperative communication has received tremendous interest for wireless networks. Most existing works on cooperative communications are focused on link-level physical layer issues. Consequently, the impacts of coopera...

VLSI Design of Low Power Reversible 8-bit Barrel Shifter

Nowadays reversible circuit designing is the emerging area of research. This design strategy aims towards the formation of digital circuits with ideally zero power dissipation. And also Reversible logic is gaining int...

Construction Technique for Optimized Data Transmission Over Wireless Radio Network

Cognitive Radio is a radio for wireless communications in which either a network or a wireless node changes its transmission or reception parameters based on the interaction with the environment to communicate efficie...

Download PDF file
  • EP ID EP8540
  • DOI -
  • Views 377
  • Downloads 26

How To Cite

Vishakha S. Kulkarni, M. S. Gayathri (2014). Preserve the Privacy of Anonymous and Confidential Database using K-anonymity. The International Journal of Technological Exploration and Learning, 3(2), 425-429. https://europub.co.uk./articles/-A-8540