Privacy-Preserving Updates to Anonymous and Confidential Databases - JAVA
#1

Privacy-Preserving Updates to Anonymous and Confidential Databases -
JAVA




ABSTRACT
Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted with a
tuple owned by Bob, is still k-anonymous. Also, suppose that access to the database is strictly controlled, because
for example data are used for certain experiments that need to be maintained confidential. Clearly, allowing Alice
to directly read the contents of the tuple breaks the privacy of Bob (e.g., a patient’s medical record); on the other
hand, the confidentiality of the database managed by Alice is violated once Bob has access to the contents of the
database. Thus, the problem is to check whether the database inserted with the tuple is still k-anonymous, without
letting Alice and Bob know the contents of the tuple and the database respectively. In this paper, we propose two
protocols solving this problem on suppression-based and generalization-based k-anonymous and confidential
databases. The protocols rely on well-known cryptographic assumptions, and we provide theoretical analyses to
proof their soundness and experimental results to illustrate their efficiency.
Reply
#2
ppt on privacy preserving updates on anonymous and confidintial databases
Reply
#3
to get information about the topic privacy preserving updates to confidential and anonymous databases full report ppt and related topic refer the page link bellow

http://studentbank.in/report-privacy-pre...bases-java

http://seminarsprojects.in/showthread.ph...7#pid63877
Reply
#4

(14-02-2012, 11:00 AM)project uploader Wrote: Privacy-Preserving Updates to Anonymous and Confidential Databases -
JAVA




ABSTRACT
Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted with a
tuple owned by Bob, is still k-anonymous. Also, suppose that access to the database is strictly controlled, because
for example data are used for certain experiments that need to be maintained confidential. Clearly, allowing Alice
to directly read the contents of the tuple breaks the privacy of Bob (e.g., a patient’s medical record); on the other
hand, the confidentiality of the database managed by Alice is violated once Bob has access to the contents of the
database. Thus, the problem is to check whether the database inserted with the tuple is still k-anonymous, without
letting Alice and Bob know the contents of the tuple and the database respectively. In this paper, we propose two
protocols solving this problem on suppression-based and generalization-based k-anonymous and confidential
databases. The protocols rely on well-known cryptographic assumptions, and we provide theoretical analyses to
proof their soundness and experimental results to illustrate their efficiency.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: latest technology updates ppt, privacy preserving updates to anonymous and confidential databases documentation, latest updates about security issues in manet, privacy preserving updates to anonymous and confidential database report, ac results updates, project freedom anonymous, bluejacking anonymous,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Types and Functions of Jigs and Fixtures project uploader 1 3,223 27-10-2012, 04:11 PM
Last Post: seminar details
  Java™: The Complete Reference, Seventh Edition project uploader 0 1,044 09-06-2012, 05:07 PM
Last Post: project uploader
  Computer Security Pretty Good Privacy seminar details 0 988 09-06-2012, 04:22 PM
Last Post: seminar details
  PROTOTYPING AND DYNAMIC ANALYSIS OF ROTOR SHAFT AND HUB seminar details 0 416 08-06-2012, 05:13 PM
Last Post: seminar details
  NC and CNC machines and Control Programming ppt seminar details 0 2,109 08-06-2012, 12:53 PM
Last Post: seminar details
  An Ontology-Supported Web Focused-Crawler for Java Programs project uploader 0 1,159 08-06-2012, 11:31 AM
Last Post: project uploader
  design and implementation of intelligent wind turbine and control system seminar details 0 1,136 07-06-2012, 02:53 PM
Last Post: seminar details
  Building a Java chat server seminar details 0 1,321 07-06-2012, 12:07 PM
Last Post: seminar details
  SECURITY and PRIVACY IN WIRELESS LAN seminar details 0 792 05-06-2012, 05:57 PM
Last Post: seminar details
  A Privacy-Preserving Location Monitoring System for Wireless Sensor full report seminar details 0 818 05-06-2012, 03:47 PM
Last Post: seminar details

Forum Jump: