securityofdata
TRANSCRIPT
DATABASE SECURITY
MOTIVATION
Medical data
Consumer purchase data
Census data
Communication and media-related data
Data gathered by government agencies
Unauthorized Exposure
Malicious Attempt To Steal And
Modify The Data
Hackers
METHOD•Level of noise between the original and distorted data is found out.• If it is higher than the threshold
value, then it can be easily hacked.• Data holder add some more noise.• Process repeated until it falls within
minimum threshold value.• Thus the privacy level is raised.
PERFORMANCE
EVALUVATION
• The proposed system is trained to overcome both the linear and non-linear attacks from the hackers.
• The existing system deals only with linear attacks.
• Checking with the existing noise level until there is no similarity we can increase the privacy to greater extent.
Additive
petrubatio
n
Multiplicative
petrubation
Non linear perturbation Petrubation techniques