M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015
Secure Information Brokering in Distributed Information Sharing
Priyanka M. Jamunkar, Prof. G. M. Bhandari
Information Brokering System (IBS) on a peer-to-peer overlay has been proposed to support information sharing among loosely federated data sources. Todays organizations raise increasing needs for information sharing through on demand information access. To aid requirement of organization information systems are designed as distributed network systems, where existing information systems and new components are connected together using a middleware. Many existing IBSs assume that brokers are trusted and only adopt server-side access control for data condentiality. One commonly accepted and used system is Distributed Information Brokering System, which is a peer-to-peer network that comprises different data servers, and brokering components helping client queries locate the data. Preserve privacy of multiple stakeholders involved in the information brokering process and dene two privacy attacks, attribute-correlation attack and inference attack, and propose two countermeasure schemes automaton segmentation and query segment encryption to securely share the routing decision. The idea of information sharing across such databases, and increase protocol that no single entity hold the complete data that can be misused but it is passed on to the requested entity securely.
Keywords: Access control, Distributed network, Information sharing, Information systems, Privacy
Edition: Volume 4 Issue 7, July 2015
Pages: 267 - 270
How to Cite this Article?
Priyanka M. Jamunkar, Prof. G. M. Bhandari, "Secure Information Brokering in Distributed Information Sharing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155735, Volume 4 Issue 7, July 2015, 267 - 270
133 PDF Views | 112 PDF Downloads
Similar Articles with Keyword 'Access control'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1737 - 1740Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud
Nilam Musale, Vilas Gaikwad
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1087 - 1088A Survey on the Various Techniques of Data Leakage Detection
Saranya S. Devan, Minu Lalitha Madhavu
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2839 - 2841Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing
Sagar S. Sanghavi, Rajesh A. Auti
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1752 - 1755SNPDAC: Secure Network Protocol with Data Access Controlling in WSN
Uttarkar Amit Ratikant, Hingoliwala H. A.
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2712 - 2714Privacy Preserving DAC for Data in Cloud
Pankaj R. Chandre, Swati S. Gore
Similar Articles with Keyword 'Distributed network'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2320 - 2322Survey on Data Collection Methods for Wireless Sensor Network
Soumya Dath G
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2202 - 2204Software License Authentication: A Smart Card Approach
Tadiboina Tarun, Shaik Nyamathulla
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2701 - 2704Review on Self Organized Trust Model for Distributed Systems
Suyog Ashokrao Nagare
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016
Pages: 1612 - 1617Intrusion Detection in Dynamic Distributed Network Using PSO and SVM Machine Learning Algorithms
Amol S. Jadhav, Dhanashree Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1292 - 1295Stream Authentication Using Trapdoor Hash Function
Dodla Padmaja, P. Srilatha
Similar Articles with Keyword 'Information sharing'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1742 - 1745A Novel Routing Based Path Planning Using RSU and OBU for Time Critical Information Sharing
Dr. Raafiya Gulmeher, Javeriya Shabnam
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2839 - 2841Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing
Sagar S. Sanghavi, Rajesh A. Auti
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1598 - 1601A Novel Approach to Improve the Privacy of Information Brokering in Semantic Web
Supriya S. Sankpal, Rupali A. Mahajan
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2347 - 2349A Survey on Security and Accuracy Constrained Privacy Preserving Task Based Access Control Mechanism for Relational Data
Pratik Bhingardeve, D. H. Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1613 - 1619Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++
Monika Arora, Anish Sandiliya
Similar Articles with Keyword 'Information systems'
Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1251 - 1256IT Auditing and its Standards
Dr D S Kushwaha, Ankur Singh
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1347 - 1350A QR-Code Authentication for Medical Image Access Environment
Inakollu Ramesh, K. B. V. Rama Narasimham
Review Papers, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017
Pages: 1205 - 1209Management of Hospital Information System through GIS: A Review
Pragati Suresh Ardhapurkar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2241 - 2244Backup Anomaly Identification with R and Hadoop
Ravindra Phule, Madhav Ingle
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 12, December 2017
Pages: 1929 - 1934A Survey on Web Pre-Fetching and Web Caching Techniques for Latency Optimization in Mobile Environment
P. Amudha Bhomini, Dr. Jayasudha J.S
Similar Articles with Keyword 'Privacy'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2267 - 2274Two Accounts of Solitude in Online Communal Networks
Alla Venu Gopal, G. Srinivasa Reddy
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 823 - 826Survey Paper on Users Location Hiding In Geosocial Recommendation Applications
Mayura Phadnis, Kanchan Varpe
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1253 - 1257Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing
Vandhana V
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1165 - 1168Privacy Preserving Closed Frequent Pattern Mining
Anju Vijayan
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum