International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 121

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015

Comparative Analysis of Privacy Preserving Techniques in Distributed Database

Sapana Anant Patil, Dr. Abhijit Banubakode

In recent years, isolation takes an imperative role to secure the data from various probable attackers. For public advantage data need to be shared as required for Health care and researches, individual privacy is major concern with respect to sensitive information. For that anonymization of data with K-anonymity and L-diversity are studied. Existing system is depends on providers and is used generalization technique for anonymization. This will increase in data loss to avoid this slicing techniques are used. Data publishing is done in such a way that privacy of data should be preserved. While publishing collaborative data to multiple data providers two types of problem occurs, first is outsider attack and second is insider attack. Outsider attack is by the people who are not data providers and insider attack is by colluding data provider who may use their own data records to understand the data records shared by other data providers. The paper focuses on insider attack, and makes some contributions. This problem can be overcome by combining slicing techniques with m-privacy techniques and addition of protocols as secure multiparty computation and trusted third party will increase the privacy of system effectively.

Keywords: Anonymization, Bucketization, Distributed database, Privacy, Security

Edition: Volume 4 Issue 1, January 2015

Pages: 735 - 739

Share this Article

How to Cite this Article?

Sapana Anant Patil, Dr. Abhijit Banubakode, "Comparative Analysis of Privacy Preserving Techniques in Distributed Database", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB15273, Volume 4 Issue 1, January 2015, 735 - 739

Enter Your Email Address


Similar Articles with Keyword 'Anonymization'

Downloads: 1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Downloads: 94

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Similar Articles with Keyword 'Bucketization'

Downloads: 110

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1539 - 1542

Privacy Based Association Rules in Secure Horizontal Database

Zameena R, Nitha L Rozario

Share this Article

Downloads: 111

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 679 - 682

Review of Slicing Approach: Data Publishing with Data Privacy and Data Utility

Vina M. Lomte, Hemlata B. Deorukhakar

Share this Article

Similar Articles with Keyword 'Distributed database'

Downloads: 68

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1757 - 1758

A Review of Privacy Clustered Mining of Association Rules in Distributed Databases

Vanita Babane, Shital K.Somawar

Share this Article

Similar Articles with Keyword 'Privacy'

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Similar Articles with Keyword 'Security'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article
Top