Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing

Sagar S. Sanghavi, Rajesh A. Auti

To provide extensive associations, todays groups raise increasing needs for information sharing via On-demand information access. Information Brokering System (IBS) atop a peer-to-peer cover has been wished-for to support Information sharing among loosely federated data sources, consists of various data servers and brokering mechanism that assist client queries to find the data servers. Several accessible IBSs has adopt server region right to use, manage, operation based on assumptions for brokers, and shed slight consideration on privacy of data stored and transactions within the IBS. We study the drawback of privacy protection in IBS. First look out the threat models with a focus on two attacks: 1. attribute-correlation attack and 2. Inference attack. Later on, we propose a broker-coordinator overlay, also two schemes, 1. automaton segmentation scheme and 2. Request Based segment encryption scheme. set of brokering servers are secure by applying the Request Based routing functions With wide analysis on privacy, peer to peer performance, and scalability. we give you an idea about that the proposed system can integrate security enforcement, Request Based routing while preserving system-wide privacy with reasonable overhead.

Keywords: Access control, information sharing IS, privacy

Edition: Volume 3 Issue 11, November 2014

Pages: 2839 - 2841

Share this Article

How to Cite this Article?

Sagar S. Sanghavi, Rajesh A. Auti, "Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14141, Volume 3 Issue 11, November 2014, 2839 - 2841

101 PDF Views | 90 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Access control'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2839 - 2841

Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing

Sagar S. Sanghavi, Rajesh A. Auti

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2712 - 2714

Privacy Preserving DAC for Data in Cloud

Pankaj R. Chandre, Swati S. Gore

Share this Article

Similar Articles with Keyword 'information sharing IS'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2839 - 2841

Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing

Sagar S. Sanghavi, Rajesh A. Auti

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2347 - 2349

A Survey on Security and Accuracy Constrained Privacy Preserving Task Based Access Control Mechanism for Relational Data

Pratik Bhingardeve, D. H. Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2415 - 2421

Implementation of One Time Pad Cipher with Rail Fence and Simple Columnar Transposition Cipher, for Achieving Data Security

Jawad Ahmad Dar, Sandeep Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1083 - 1088

A Novel Approach for Encryption of Text Messages, Enhancing the Security of Simple Coloumnar Transposition Cipher with Ceasar Cipher and Rail Fence Cipher, Under 15 Parameters

Jawad Ahmad Dar, Amit Verma

Share this Article

Similar Articles with Keyword 'privacy'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on Users Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article
Top