alexa Abstract | Privacy Preserving Data Sharing with Encrypted Anonymous ID Assignment
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article Open Access

Abstract

An algorithm for sharing of private data among N parties is developed. This work deals with efficient algorithms for assigning identifiers (IDs) to the nodes of a network in such a way that the IDs are anonymous using a distributed computation with no central authority. Given N nodes, this assignment is essentially a permutation of the integers {1….N} with each ID being known only to the node to which it is assigned. Resistance to collusion among other members is verified in an information theoretic sense when private communication channels are used. This assignments of IDs allows complex data to be shared and has applications in privacy preserving data mining, collision avoidance in communications and distributed database access. Existing and new algorithms for assigning IDs are examined with respect to trade-offs between communicational and computational requirements. New algorithms are built on top of secure sum data mining operations using Newtons identities.Markov chain representations are used to find statistics of number of iterations. . In this system, owner is assigned a randomly generated encrypted ID, with which data stored in the database is encrypted. This ensures confidentiality of the data. Another party can access data only if permission is granted by the owner. Also a comparison study based on different encryption methods are performed. The required computations are distributed without using a trusted central authority

To read the full article Peer-reviewed Article PDF image | Peer-reviewed Full Article image

Author(s): Akhila M, Nitha L Rozario

Share This Page

Additional Info

Loading
Loading Please wait..
 
 
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords