• No results found

privacy-preserving access algorithm

UNCRACKABLE CIPHER DYNAMIC DOUBLE ENCRYPTION STANDARD IN CLOUD FOR DATA ACCESS CONTROL AND PRIVACY PRESERVING MECHANISM

UNCRACKABLE CIPHER DYNAMIC DOUBLE ENCRYPTION STANDARD IN CLOUD FOR DATA ACCESS CONTROL AND PRIVACY PRESERVING MECHANISM

... Cryptographic algorithms are being used for the protection of data, the security objective called confidentiality [1]-[3] which is the parameter that is considered and integrated with the system. [2]-[4] However,still, ...

15

Access control scheme to big data using privacy preserving policy

Access control scheme to big data using privacy preserving policy

... the privacy leakage from the access policy, a straight forward method is to hide the attributes in the access ...the access policy, which makes the decryption a challenging ...user ...

8

Preserving Privacy Using Attribute Based Access Control in DataStream

Preserving Privacy Using Attribute Based Access Control in DataStream

...  Access Control Mechanism I: The framework of Access Control Mechanism -I uses Attribute-based access control (ABAC), provides a high level of flexibility that promotes security and information ...

7

Access control management and privacy-preserving

Access control management and privacy-preserving

... between privacy and information ...c-means algorithm [1], and Laszlo and Mukherjee [11] extended the standard minimum spanning tree partitioning algorithm for microaggregation ...

166

Distributed Privacy preserving and Handling Privacy information leakage by using  k  anonymity algorithm

Distributed Privacy preserving and Handling Privacy information leakage by using k anonymity algorithm

... We assume that there exists a large finite population of patients denoted by the set . We then have . An intruder would have access to an identification database about the population , and uses this identification ...

9

Access control management and privacy-preserving

Access control management and privacy-preserving

... ABSTRACT v troid of the cluster which we refer to systematic microaggregation for SDC. The structure of the systematic microaggregation problem is defined and investigated and an algorithm of the proposed problem ...

15

Privacy Preserving Data Access to Cloud

Privacy Preserving Data Access to Cloud

... Cyptographic-based access control is implemented in order to support privacy-preserving authentication and authorization for data outsourcing ...novel access control model consolidating ...

6

A Review on Privacy Preserving Data Access Control Mechanism in Hybrid Clouds

A Review on Privacy Preserving Data Access Control Mechanism in Hybrid Clouds

... In hybrid clouds establishes requirements for a secure and anonymous communication system that uses a cloud architecture (Tor and Freenet). Nevertheless, the author does not outline any cryptographic solution. Another ...

5

A new differential privacy preserving crowdsensing scheme based on the Owen value

A new differential privacy preserving crowdsensing scheme based on the Owen value

... of privacy protection. When a MUD chooses a higher level of privacy protection, his MC contribution is ...of privacy protection and his payoff maximization. Access point (AP): AC is a ...

10

Privacy Preserving Approach for Preventing From Access to Unauthorized Users

Privacy Preserving Approach for Preventing From Access to Unauthorized Users

... This segment of the work briefly analyses the “probability distribution” of GGMM and its attributes utilized in the criminal identification algorithm. Let the image information values (intensities) in the total ...

8

Privacy Preserving Using Extended Euclidean Algorithm Applied To RSA Homomorphic Encryption Technique

Privacy Preserving Using Extended Euclidean Algorithm Applied To RSA Homomorphic Encryption Technique

... From the Table 2, it is clear that for different file sizes which is taken in kilobytes, we have calculated the total encryption time and total decryption time for each file size .It is clear that the decryption process ...

5

Privacy Preservation on Big Data using Efficient Privacy Preserving Algorithm

Privacy Preservation on Big Data using Efficient Privacy Preserving Algorithm

... various privacy preserving data mining algorithms and comparing different kinds of privacy preserving classification rule mining ...protect privacy of data during big data ...remote ...

5

Privacy Preserving Data Mining Using
          Sanitizing Algorithm

Privacy Preserving Data Mining Using Sanitizing Algorithm

... developed privacy protection laws and regulations to guard against private use of personal information, the existing laws and their conceptual foundations have become outdated because of changes in ...existing ...

6

Association Rule Mining in Horizontally          Distributed Databases

Association Rule Mining in Horizontally Distributed Databases

... Apriori algorithm is used to generate candidate ...Apriori algorithm cannot meet their needs over large ...this algorithm is improved and put forward Sampling ...Sampling algorithm is used to ...

5

Title: Survey on Decentralized Access Control with Anonymous Authentication of Data Stored in Cloud

Title: Survey on Decentralized Access Control with Anonymous Authentication of Data Stored in Cloud

... “Privacy Preserving Access Control with Authentication for Securing Data in Clouds” Current methodologies to impose fine-grained access control on confidential data hosted in the cloud remain ...

7

PRIVACY-PRESERVING USING ACCESS CONTROL MECHANISM  FOR RELATIONAL INCREMENTAL DATA

PRIVACY-PRESERVING USING ACCESS CONTROL MECHANISM FOR RELATIONAL INCREMENTAL DATA

... The repartitioning is first performed for the set of queries within 10% of the bound. The partitions that are modified are removed from the candidate set and then the second group of queries is checked. The ...

8

Rotation Perturbation Technique for Privacy Preserving in Data Stream Mining Kalyani Kathwadia 1, Aniket Patel2

Rotation Perturbation Technique for Privacy Preserving in Data Stream Mining Kalyani Kathwadia 1, Aniket Patel2

... generate privacy appreciative database by extracting sensitive data from the original ...achieve privacy preserving perturbing the data for privacy preserving is very conducive ...

7

Privacy Preserving Association Rule Mining using ROBFRUGHAL Algorithm

Privacy Preserving Association Rule Mining using ROBFRUGHAL Algorithm

... technology. Privacy Preserving Data Mining (PPDM) deals with the protection of private ...data privacy. The data is transformed by the owner in order to provide privacy which is then sent to ...

6

ENHANCED SECURE DATA SHARING IN DYNAMIC GROUPS

ENHANCED SECURE DATA SHARING IN DYNAMIC GROUPS

... Storing data on remote cloud storage makes the maintenance affordable by data owners. The trustworthiness and reliability of these remote storage locations is the main concern for data owners and cloud service ...

6

A Privacy Preserving Data Mining Technique for Preventing Data Discloser and Leakage

A Privacy Preserving Data Mining Technique for Preventing Data Discloser and Leakage

... manage privacy and utility of data (in a data mining system), a privacy preserving technique is ...data privacy preserving data model is proposed for design and ...based ...

6

Show all 10000 documents...

Related subjects