International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015

A Secure Approach for Privacy-Preserving in Information Brokering System using Query Forwarding

Madhuri D. Dhayarkar, Ram B. Joshi

There is an increasing need for information sharing via on-demand access in different organizations. Information Brokering Systems (IBSs) have been introduced to connect large-scale lightly-associated data sources. This system includes brokers that are responsible for routing decisions to direct client queries to the requested servers where data is located. Existing IBSs consists of brokers that are trusted and thus only adopt server-side access control for data confidentiality. However the privacy of location of data and information about consumer can still be concluded from metadata (such as query and access control rules) exchanged within the brokering system, thus the protection of the metadata is a major issue in IBS. The proposed scheme presents an overview on information sharing in distributed environment through information brokering system and problems associated with it thus providing scope for healthcare information systems. The objective is to overcome two attacks- attribute correlation attack and inference attack providing security enforcement and to provide two countermeasure schemes namely automaton segmentation and query segment encryption scheme. Thus central authority is necessary for routing decision making responsibility among a selected set brokering servers.

Keywords: Access Control, Information sharing, Privacy preservation, Automaton segmentation scheme, Query segment encryption scheme

Edition: Volume 4 Issue 1, January 2015

Pages: 2461 - 2464


How to Cite this Article?

Madhuri D. Dhayarkar, Ram B. Joshi, "A Secure Approach for Privacy-Preserving in Information Brokering System using Query Forwarding", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB15865, Volume 4 Issue 1, January 2015, 2461 - 2464

25 PDF Views | 22 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Access Control'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2461 - 2464

A Secure Approach for Privacy-Preserving in Information Brokering System using Query Forwarding

Madhuri D. Dhayarkar, Ram B. Joshi

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1899 - 1902

Privacy Preservation in Cloud Using Attribute Based Encryption

T. Arokiaarun, D. Saveetha

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2347 - 2349

A Survey on Security and Accuracy Constrained Privacy Preserving Task Based Access Control Mechanism for Relational Data

Pratik Bhingardeve, D. H. Kulkarni

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1221 - 1224

Quick and Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

A. Vineth, John Deva Prasanna

Share this article



Similar Articles with Keyword 'Information sharing'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2461 - 2464

A Secure Approach for Privacy-Preserving in Information Brokering System using Query Forwarding

Madhuri D. Dhayarkar, Ram B. Joshi

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2347 - 2349

A Survey on Security and Accuracy Constrained Privacy Preserving Task Based Access Control Mechanism for Relational Data

Pratik Bhingardeve, D. H. Kulkarni

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1083 - 1088

A Novel Approach for Encryption of Text Messages, Enhancing the Security of Simple Coloumnar Transposition Cipher with Ceasar Cipher and Rail Fence Cipher, Under 15 Parameters

Jawad Ahmad Dar, Amit Verma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 877 - 880

Surveying Personal Information, Privacy and Security in Cloud Computing

Priya Dhingra, Shakti Nagpal

Share this article



Similar Articles with Keyword 'Privacy preservation'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1595 - 1596

User Privacy Protection in Personalised Web Search

Siva B, Merlin Shoerio

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2461 - 2464

A Secure Approach for Privacy-Preserving in Information Brokering System using Query Forwarding

Madhuri D. Dhayarkar, Ram B. Joshi

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1899 - 1902

Privacy Preservation in Cloud Using Attribute Based Encryption

T. Arokiaarun, D. Saveetha

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1952 - 1957

Navigation Query Security through Privacy Preservation and Cryptography in VANETs

Anuradha T, Saba Tahseen

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this article



Similar Articles with Keyword 'Automaton segmentation scheme'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2461 - 2464

A Secure Approach for Privacy-Preserving in Information Brokering System using Query Forwarding

Madhuri D. Dhayarkar, Ram B. Joshi

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2839 - 2841

Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing

Sagar S. Sanghavi, Rajesh A. Auti

Share this article
Top