Downloads: 109 | Views: 270
Review Papers | Computer Science & Engineering | India | Volume 4 Issue 10, October 2015 | Popularity: 6.7 / 10
Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission
Shital Gawahale, Rekha Jadhav
Abstract: Privacy preserving is one of the most important research topics in the data security field and it has become a serious concern in the secure transformation of personal data in recent years. For example, different credit card companies and disease control centers may try to build better data sharing or publishing models for privacy protection through privacy preserving data mining techniques (PPDM). A model has been proposed to design the effective Privacy Preserving Mining Framework for secure private information transformation and Publishing. The system considers a distributed database such as bank database that is used to construct the incentive model. Basically incentive data are used to check the user knowledge that is the online processing user is correct person or not. Incentive Compatible Model based secure code computation process and PPDM techniques like Association rule mining, Randomization method and Cryptographic technique. An Encryption algorithm is used to identify which data sets need to be encrypted for preserving privacy in data storage publishing. Secure multi-party computation (SMC) has recently emerged as an answer to this problem but SMC model they had generate only one key for the each card and after some extent time there may be chance of hacking the password by the hackers. To overcome the above said problem in our proposed system we are using symmetric key cipher algorithm to increase the security measures. In this system it will encrypt the security code so if any hacker check for the key it will be in encrypted format so no one can hack the password. And to send the keys to the mail we are using Java Mail API directly to communicate with the Gmail server.
Keywords: PPDA, PPDM, SMC, TTP
Edition: Volume 4 Issue 10, October 2015
Pages: 2084 - 2088
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Masters Thesis, Computer Science & Engineering, India, Volume 12 Issue 4, April 2023
Pages: 1324 - 1330A Thesis on News Recommendation
Abhik Naskar, Sudeshna Sarkar
Downloads: 100
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 878 - 881Detection of Malicious Client based HTTP/DoS Attack on Web Server
Dhanya Jayan, Pretty Babu
Downloads: 103
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1628 - 1631A Survey On XML-Injection Attack Detection Systems
Swati Ramesh Kesharwani, Aarti Deshpande
Downloads: 104
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2982 - 2984Protection of Server from Proxy Based HTTP Attacks
Poonam Uttam Patil, Y. V. Chavan
Downloads: 107
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1887 - 1991Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network
Rawendra Pratap Singh, Savita Shiwani