Secure Information Brokering in Distributed Information Sharing
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015

Secure Information Brokering in Distributed Information Sharing

Priyanka M. Jamunkar, Prof. G. M. Bhandari

Information Brokering System (IBS) on a peer-to-peer overlay has been proposed to support information sharing among loosely federated data sources. Todays organizations raise increasing needs for information sharing through on demand information access. To aid requirement of organization information systems are designed as distributed network systems, where existing information systems and new components are connected together using a middleware. Many existing IBSs assume that brokers are trusted and only adopt server-side access control for data condentiality. One commonly accepted and used system is Distributed Information Brokering System, which is a peer-to-peer network that comprises different data servers, and brokering components helping client queries locate the data. Preserve privacy of multiple stakeholders involved in the information brokering process and dene two privacy attacks, attribute-correlation attack and inference attack, and propose two countermeasure schemes automaton segmentation and query segment encryption to securely share the routing decision. The idea of information sharing across such databases, and increase protocol that no single entity hold the complete data that can be misused but it is passed on to the requested entity securely.

Keywords: Access control, Distributed network, Information sharing, Information systems, Privacy

Edition: Volume 4 Issue 7, July 2015

Pages: 267 - 270

Share this Article

How to Cite this Article?

Priyanka M. Jamunkar, Prof. G. M. Bhandari, "Secure Information Brokering in Distributed Information Sharing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155735, Volume 4 Issue 7, July 2015, 267 - 270

133 PDF Views | 112 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Access control'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2839 - 2841

Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing

Sagar S. Sanghavi, Rajesh A. Auti

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2712 - 2714

Privacy Preserving DAC for Data in Cloud

Pankaj R. Chandre, Swati S. Gore

Share this Article

Similar Articles with Keyword 'Distributed network'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2320 - 2322

Survey on Data Collection Methods for Wireless Sensor Network

Soumya Dath G

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2202 - 2204

Software License Authentication: A Smart Card Approach

Tadiboina Tarun, Shaik Nyamathulla

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2701 - 2704

Review on Self Organized Trust Model for Distributed Systems

Suyog Ashokrao Nagare

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1612 - 1617

Intrusion Detection in Dynamic Distributed Network Using PSO and SVM Machine Learning Algorithms

Amol S. Jadhav, Dhanashree Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1292 - 1295

Stream Authentication Using Trapdoor Hash Function

Dodla Padmaja, P. Srilatha

Share this Article

Similar Articles with Keyword 'Information sharing'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1742 - 1745

A Novel Routing Based Path Planning Using RSU and OBU for Time Critical Information Sharing

Dr. Raafiya Gulmeher, Javeriya Shabnam

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2839 - 2841

Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing

Sagar S. Sanghavi, Rajesh A. Auti

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1598 - 1601

A Novel Approach to Improve the Privacy of Information Brokering in Semantic Web

Supriya S. Sankpal, Rupali A. Mahajan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2347 - 2349

A Survey on Security and Accuracy Constrained Privacy Preserving Task Based Access Control Mechanism for Relational Data

Pratik Bhingardeve, D. H. Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Similar Articles with Keyword 'Information systems'

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1347 - 1350

A QR-Code Authentication for Medical Image Access Environment

Inakollu Ramesh, K. B. V. Rama Narasimham

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 1205 - 1209

Management of Hospital Information System through GIS: A Review

Pragati Suresh Ardhapurkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2241 - 2244

Backup Anomaly Identification with R and Hadoop

Ravindra Phule, Madhav Ingle

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 12, December 2017

Pages: 1929 - 1934

A Survey on Web Pre-Fetching and Web Caching Techniques for Latency Optimization in Mobile Environment

P. Amudha Bhomini, Dr. Jayasudha J.S

Share this Article

Similar Articles with Keyword 'Privacy'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on Users Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article
Top