International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 109

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014


A Novel Approach to Improve the Privacy of Information Brokering in Semantic Web

Supriya S. Sankpal, Rupali A. Mahajan


Abstract: As enormous structured, semi-structured and unstructured data are collected and archived by organizations in many realms ranging from business to health networks to government agencies, the needs for efficient yet secure inter-organization information sharing via on-demand access naturally arise. Now a day, information brokering system has honest assumptions on brokers who can fulfill the requirements of user by locating right data provider where required data is present. Moreover, with increasing concerns on protecting the sensitive and/or proprietary data, the organizations prefer sharing data in a more secure and privacy-preserving manner, instead of establishing a purely full trust relationship on brokers and releasing the control over the shared data. In this paper, we propose a new privacy-preserving information brokering system (PPIBS), with privacy enhancing encryption algorithms such as AES for selective encryption which protect the identity of the data requestor who forward the request to broker and two tier encryption using Vigenere cipher and Selective Reverse Circle Cipher and Huffman encryption algorithm to enrich the data privacy.


Keywords: Access Control, Encryption, Information Brokering System, Privacy, Secrete Key


Edition: Volume 3 Issue 7, July 2014,


Pages: 1598 - 1601


How to Cite this Article?

Supriya S. Sankpal, Rupali A. Mahajan, "A Novel Approach to Improve the Privacy of Information Brokering in Semantic Web", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=20141291, Volume 3 Issue 7, July 2014, 1598 - 1601

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Access Control'

Downloads: 68

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 119 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'Information Brokering System'

Downloads: 107

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2839 - 2841

Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing

Sagar S. Sanghavi, Rajesh A. Auti

Share this Article

Downloads: 115

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2461 - 2464

A Secure Approach for Privacy-Preserving in Information Brokering System using Query Forwarding

Madhuri D. Dhayarkar, Ram B. Joshi

Share this Article

Similar Articles with Keyword 'Privacy'

Downloads: 134

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Similar Articles with Keyword 'Secrete Key'

Downloads: 109

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1315 - 1318

Enhanced Certificate Revocation Method in Mobile Adhoc Networks

Jayendra Kumar, Prakash Ravirakula

Share this Article

Downloads: 119

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1289 - 1291

Cryptography in Image Using Blowfish Algorithm

S. S. Sudha, S. Divya

Share this Article

Similar Articles with Keyword 'Access'

Downloads: 156 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article

Similar Articles with Keyword 'Control'

Downloads: 181 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 156 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article
Top