186 research outputs found

    Secure Login of Statistical Data With Two Parties

    Get PDF
    Privacy-containing data publishing shows the problem of releasing sensitive data while the mining of useful information. Among present privacy models, SHA privacy algorithm provides more security and privacy model. In this paper, we address the problem of released private data, where different dataset for the same set of user are held by two parties. Here, we present an algorithm for sensitive private data released on web in the form of statistical data. After this, we propose a SHA algorithm that releases differentially private data in a secure way during the privacy computation. Experimental results on real-scenario suggest that the proposed algorithm can effectively preserve information during mining of private information. DOI: 10.17762/ijritcc2321-8169.150312

    The Role of Quasi-identifiers in k-Anonymity Revisited

    Get PDF
    The concept of k-anonymity, used in the recent literature to formally evaluate the privacy preservation of published tables, was introduced based on the notion of quasi-identifiers (or QI for short). The process of obtaining k-anonymity for a given private table is first to recognize the QIs in the table, and then to anonymize the QI values, the latter being called k-anonymization. While k-anonymization is usually rigorously validated by the authors, the definition of QI remains mostly informal, and different authors seem to have different interpretations of the concept of QI. The purpose of this paper is to provide a formal underpinning of QI and examine the correctness and incorrectness of various interpretations of QI in our formal framework. We observe that in cases where the concept has been used correctly, its application has been conservative; this note provides a formal understanding of the conservative nature in such cases.Comment: 17 pages. Submitted for publicatio

    A look ahead approach to secure multi-party protocols

    Get PDF
    Secure multi-party protocols have been proposed to enable non-colluding parties to cooperate without a trusted server. Even though such protocols prevent information disclosure other than the objective function, they are quite costly in computation and communication. Therefore, the high overhead makes it necessary for parties to estimate the utility that can be achieved as a result of the protocol beforehand. In this paper, we propose a look ahead approach, specifically for secure multi-party protocols to achieve distributed k-anonymity, which helps parties to decide if the utility benefit from the protocol is within an acceptable range before initiating the protocol. Look ahead operation is highly localized and its accuracy depends on the amount of information the parties are willing to share. Experimental results show the effectiveness of the proposed methods
    corecore