privacy-preserving updates to anonymous and confidential databases abstract by coreieeeprojects

8

Click here to load reader

Upload: madhu-sudan-u

Post on 28-Jul-2015

330 views

Category:

Documents


0 download

DESCRIPTION

Core IEEE Projects, Core Projects is a division of Conceptz Corporate Training focused to deliver project. We are a diversified team of people working towards a common goal of providing the best project delivery for Final year BE M-TECH, BCA, BSc, MCA, MSc students. or in the industry to our clients. We Work closely with our project to understand their Business Process, give them the Best possible Delivery Model to minimize the Cost and maximize the ROI..

TRANSCRIPT

Page 1: Privacy-Preserving Updates to Anonymous and Confidential Databases Abstract by Coreieeeprojects

Core IEEE Projects (Division of Conceptz)#108,5th Main, 4th Cross, Hanumanth Nagar, Basavanagudi, Bangalore-50, Website: www.coreieeeprojects.com contact: 9535052050

Privacy-Preserving Updates to

Anonymous and Confidential Databases

abstract by coreieeeprojects.com

ABSTRACT

Suppose Alice owns a k-anonymous database and needs to

determine whether her database, when inserted with a tuple owned by

Bob, is still k-anonymous. Also, suppose that access to the database is

strictly controlled, because for example data are used for certain

experiments that need to be maintained confidential. Clearly, allowing

Alice to directly read the contents of the tuple breaks the privacy of

Bob (e.g., a patient’s medical record); on the other hand, the

confidentiality of the database managed by Alice is violated once Bob

has access to the contents of the database. Thus, the problem is to

check whether the database inserted with the tuple is still k-

anonymous, without letting Alice and Bob know the contents of the

tuple and the database respectively. In this paper, we propose two

protocols solving this problem on suppression-based and

generalization-based k-anonymous and confidential databases. The

protocols rely on well-known cryptographic assumptions, and we

provide theoretical analyses to proof their soundness and experimental

results to illustrate their efficiency.

ARCHITECTURE:

Page 2: Privacy-Preserving Updates to Anonymous and Confidential Databases Abstract by Coreieeeprojects

Core IEEE Projects (Division of Conceptz)#108,5th Main, 4th Cross, Hanumanth Nagar, Basavanagudi, Bangalore-50, Website: www.coreieeeprojects.com contact: 9535052050

EXISTING SYSTEM:

The existing system supposes Alice owns a k-anonymous database and

needs to determine whether her database, when inserted with a tuple owned

by Bob, is still k-anonymous. Also, suppose that access to the database is

strictly controlled, because data are used for certain experiments that need

to be maintained confidential. Clearly, allowing Alice to directly read the

contents of the tuple breaks the privacy of Bob; on the other hand, the

confidentiality of the database managed by Alice is violated once Bob has

access to the contents of the database. Thus, the problem is to check

whether the database inserted with the tuple is still k-anonymous, without

letting Alice and Bob know the contents of the tuple and the database

respectively.

Disadvantage:

1. The database with the tuple data does not be maintained

confidentially.

2. The existing systems another person to easily access database.

PROPOSED SYSTEM:

Page 3: Privacy-Preserving Updates to Anonymous and Confidential Databases Abstract by Coreieeeprojects

Core IEEE Projects (Division of Conceptz)#108,5th Main, 4th Cross, Hanumanth Nagar, Basavanagudi, Bangalore-50, Website: www.coreieeeprojects.com contact: 9535052050

In the current paper, we present two efficient protocols, one of which

also supports the private update of a generalization-based anonymous

database. We also provide security proofs and experimental results for both

protocols. So far no experimental results had been reported concerning such

type of protocols; our results show that both protocols perform very

efficiently.

Advantage:

1. The anonymity of DB is not affected by inserting the records.

2. We provide security proofs and experimental results for both protocols.

Page 4: Privacy-Preserving Updates to Anonymous and Confidential Databases Abstract by Coreieeeprojects

Core IEEE Projects (Division of Conceptz)#108,5th Main, 4th Cross, Hanumanth Nagar, Basavanagudi, Bangalore-50, Website: www.coreieeeprojects.com contact: 9535052050

MODULES

1. Suppression Module.

2. Generalization Module.

3. Cryptography Module.

4. Admin Module.

Suppression Module:

This module to use the first protocol is aimed at suppression-

based anonymous databases, and it allows the owner of DB to properly

anonymized the tuple t, without gaining any useful knowledge on its

contents and without having to send to t’s owner newly generated

data. To achieve such goal, the parties secure their messages by

encrypting them. In order to perform the privacy-preserving

verification of the database anonymity upon the insertion, the parties

use a commutative and homomorphic encryption scheme.

Generalization Module:In this module, the second protocol is aimed at generalization-

based anonymous databases, and it relies on a secure set intersection

protocol, such as the one found in, to support privacy-preserving

updates on a generalization based k-anonymous DB.

Cryptography Module:

In this module, the process of converting ordinary information

called plaintext into unintelligible gibberish called cipher text.

Decryption is the reverse, in other words, moving from the

unintelligible cipher text back to plaintext. A cipher (or) cypher is a pair

of algorithms that create the encryption and the reversing decryption.

The detailed operation of a cipher is controlled both by the algorithm

Page 5: Privacy-Preserving Updates to Anonymous and Confidential Databases Abstract by Coreieeeprojects

Core IEEE Projects (Division of Conceptz)#108,5th Main, 4th Cross, Hanumanth Nagar, Basavanagudi, Bangalore-50, Website: www.coreieeeprojects.com contact: 9535052050

and in each instance by a key. This is a secret parameter (ideally

known only to the communicants) for a specific message exchange

context.

Admin Module:

In this module, to arrange the database based on the patient and

doctor details and records. The admin to encrypt the patient reports

using encryption techniques using suppression and generalization

protocols.

SYSTEM SPECIFICATION

Hardware Requirements:

• System : Pentium IV 2.4 GHz.

• Hard Disk : 40 GB.

• Floppy Drive : 1.44 Mb.

• Monitor : 14’ Colour Monitor.

• Mouse : Optical Mouse.

• Ram : 512 Mb.

• Keyboard : 101 Keyboard.

Software Requirements:

• Operating system : Windows XP.

• Coding Language : ASP.Net with C#

• Data Base : SQL Server 2005.• Tags: Core IEEE Projects, ieee Projects, ieee Projects 2011-

12,ieee projects for cse, ieee projects for cse 2011, ieee projects 2011, ieee projects 2011 in data mining, ieee projects 2011 on

Page 6: Privacy-Preserving Updates to Anonymous and Confidential Databases Abstract by Coreieeeprojects

Core IEEE Projects (Division of Conceptz)#108,5th Main, 4th Cross, Hanumanth Nagar, Basavanagudi, Bangalore-50, Website: www.coreieeeprojects.com contact: 9535052050

image processing, ieee projects 2011 topics, ieee projects 2011 list, ieee projects 2011 for cse in java, ieee projects 2011 for it, ieee projects 2011 for mca, ieee projects 2011 for computer science, ieee projects on cloud computing, ieee projects 2011 on networking, ieee projects on networking and network security, ieee projects 2011 in Bangalore, ieee projects in java, ieee projects in .net, ieee projects in asp.net, ieee projects in Bangalore, ieee Academic Projects, ieee, ieee Projects Bangalore, ieee Software Projects, Latest IEEE Projects, IEEE Student Projects, IEEE Final year Student Projects, Final Year Projects, ENGINEERING PROJECTS, MCA projects, BE projects, BCA Projects, JAVA projects, J2EE projects, .NET projects, Students projects, ieee Projects in Bangalore, M-tech Internship in Company-tech Projects in Bangalore, Real Time Projects.