Efficient and Secure Data Sharing By Applying AES Algorithm with Anonymous Id Assignment
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 121 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Efficient and Secure Data Sharing By Applying AES Algorithm with Anonymous Id Assignment

Barla Rakesh, Veladanda RamaKrishna

Security is a basic requirement of an organization in the world to keep their information secure from their competitors. Various techniques and algorithms were developed by research in order to achieve secure data sharing. We propose a technique for anonymous sharing of private data between N parties is developed. This technique is used to allocate these node ID numbers ranging from 1 to N and also apply encryption on private data. These assignments are anonymous in that the identities received are unknown to the other members of the group. Animosity between other members is verified in an information theoretic sense when private communication channels are used. This type of serial numbers assignment allows more complex data to be shared and has applications to other problems in privacy preserving data mining, animosity avoidance in communications and distributed database access. The prescribed computations are distributed without using a trusted third party central authority. Existing and new techniques for assigning anonymous IDs are examined with respect to trade-offs between communication and computational requirements. The proposed technique also finds distributed environment with minimal communication among parties and ensures higher degree of privacy with Advanced Encryption Standard (AES). It generates more secured item sets among multiple parties without affecting mining performance and optimal communication among parties with high privacy and zero percentage of data leakage. The new techniques are built on top of a secure sum data mining operation using Newtons identities and Sturms theorem.

Keywords: Anonymization and deanonymization, multiparty computation, privacy preserving data mining, secure sum algorithm, Advanced Encryption Standard AES

Edition: Volume 3 Issue 9, September 2014

Pages: 445 - 450

Share this Article

How to Cite this Article?

Barla Rakesh, Veladanda RamaKrishna, "Efficient and Secure Data Sharing By Applying AES Algorithm with Anonymous Id Assignment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14195, Volume 3 Issue 9, September 2014, 445 - 450

Enter Your Registered Email Address





Similar Articles with Keyword 'multiparty computation'

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙14

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 651 - 653

Watermark Detection for Security of Multimedia Data through MPC Privacy of Multimedia Data on the Cloud

Ujwala Pawar, Dhara Kurian

Share this Article

Downloads: 119 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1608 - 1611

Secure Mining of Association Rules from Homogeneous Database

Mahale Mohini V., Shaikh I.R.

Share this Article

Downloads: 121 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 445 - 450

Efficient and Secure Data Sharing By Applying AES Algorithm with Anonymous Id Assignment

Barla Rakesh, Veladanda RamaKrishna

Share this Article

Downloads: 121 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 735 - 739

Comparative Analysis of Privacy Preserving Techniques in Distributed Database

Sapana Anant Patil, Dr. Abhijit Banubakode

Share this Article

Similar Articles with Keyword 'privacy preserving data mining'

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1306 - 1308

A Survey on Discrimination Prevention in Data Mining

Vrushali Atulrao Mane, Prof. A. R. Deshpande

Share this Article

Downloads: 108 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1758 - 1762

Privacy-Preserving Data Mining using RDT Framework and C4.5

Komal N. Chouragade, Trupti H. Gurav

Share this Article

Downloads: 109 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1757 - 1758

A Review of Privacy Clustered Mining of Association Rules in Distributed Databases

Vanita Babane, Shital K.Somawar

Share this Article

Downloads: 109 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2084 - 2088

Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission

Shital Gawahale, Rekha Jadhav

Share this Article

Downloads: 109 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1539 - 1542

Privacy Based Association Rules in Secure Horizontal Database

Zameena R, Nitha L Rozario

Share this Article

Similar Articles with Keyword 'Advanced Encryption Standard AES'

Downloads: 121 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 445 - 450

Efficient and Secure Data Sharing By Applying AES Algorithm with Anonymous Id Assignment

Barla Rakesh, Veladanda RamaKrishna

Share this Article

Downloads: 124 | Weekly Hits: ⮙3 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 402 - 406

Improving Speed Up of Computing Using New AES Algorithm

Shweta Kumari, Abhishek Kumar

Share this Article



Top