A Novel Approach to Improve the Privacy of Information Brokering in Semantic Web
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014

A Novel Approach to Improve the Privacy of Information Brokering in Semantic Web

Supriya S. Sankpal, Rupali A. Mahajan

As enormous structured, semi-structured and unstructured data are collected and archived by organizations in many realms ranging from business to health networks to government agencies, the needs for efficient yet secure inter-organization information sharing via on-demand access naturally arise. Now a day, information brokering system has honest assumptions on brokers who can fulfill the requirements of user by locating right data provider where required data is present. Moreover, with increasing concerns on protecting the sensitive and/or proprietary data, the organizations prefer sharing data in a more secure and privacy-preserving manner, instead of establishing a purely full trust relationship on brokers and releasing the control over the shared data. In this paper, we propose a new privacy-preserving information brokering system (PPIBS), with privacy enhancing encryption algorithms such as AES for selective encryption which protect the identity of the data requestor who forward the request to broker and two tier encryption using Vigenere cipher and Selective Reverse Circle Cipher and Huffman encryption algorithm to enrich the data privacy.

Keywords: Access Control, Encryption, Information Brokering System, Privacy, Secrete Key

Edition: Volume 3 Issue 7, July 2014

Pages: 1598 - 1601

Share this Article

How to Cite this Article?

Supriya S. Sankpal, Rupali A. Mahajan, "A Novel Approach to Improve the Privacy of Information Brokering in Semantic Web", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20141291, Volume 3 Issue 7, July 2014, 1598 - 1601

81 PDF Views | 68 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Access Control'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1966 - 1971

Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET

Pallavi P Puri, Nitin R. Chopde

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1216 - 1220

Finger Vein Weightage Calculation of Imaginary Curve between Minutiae Points for Person Recognition

Reetika, Kiran Gupta

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2060 - 2063

Envision Issue Inclined of an Application Exploiting Model-Based Integration and System Test Automation

Kiran V. Bakka, Aarti Deshpande

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1122 - 1125

Improving Security of Traceable White-Box CPABE with TTP Access Control

Dilu Anil

Share this Article

Similar Articles with Keyword 'Encryption'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 9, September 2014

Pages: 2200 - 2203

Secure E-Exam Scheme

Sattar J. Aboud

Share this Article

Similar Articles with Keyword 'Information Brokering System'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2839 - 2841

Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing

Sagar S. Sanghavi, Rajesh A. Auti

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2461 - 2464

A Secure Approach for Privacy-Preserving in Information Brokering System using Query Forwarding

Madhuri D. Dhayarkar, Ram B. Joshi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1598 - 1601

A Novel Approach to Improve the Privacy of Information Brokering in Semantic Web

Supriya S. Sankpal, Rupali A. Mahajan

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 267 - 270

Secure Information Brokering in Distributed Information Sharing

Priyanka M. Jamunkar, Prof. G. M. Bhandari

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 142 - 146

Imposing Secure & Privacy-Maintaining in Distributed Information Sharing

G. Priyanka, Dr. P. Venkata Subba Reddy

Share this Article

Similar Articles with Keyword 'Privacy'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on User's Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Similar Articles with Keyword 'Secrete Key'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1315 - 1318

Enhanced Certificate Revocation Method in Mobile Adhoc Networks

Jayendra Kumar, Prakash Ravirakula

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1289 - 1291

Cryptography in Image Using Blowfish Algorithm

S. S. Sudha, S. Divya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1598 - 1601

A Novel Approach to Improve the Privacy of Information Brokering in Semantic Web

Supriya S. Sankpal, Rupali A. Mahajan

Share this Article
Top