Impact Factor:6.549
 Scopus Suggested Journal: UNDER REVIEW for TITLE INCLUSSION

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary


Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Privacy Preserving Information Brokering for Data Handling Frameworks

K.Samunnisa, K.Tarakeswar, Dr.S.Prem Kumar, ,
Affiliations
M.Tech Research Scholar</br>Assistant Professor</br>Head of the Department Department of CSE, G.Pullaiah College of Engineering and Technology, Kurnool JNTU Anatapur, Andhra Pradesh, India
:NOT ASSIGNED


Abstract
In recent year’s organizations heave rising require for data imparting through oninterest access. Data handling frameworks have been proposed to associate vast scale inexactly unified information sources through a facilitating overlay, in which the intermediaries settle on steering choices to regulate customer questions to the asked for information servers. Numerous existing data handling frameworks expect that agents are trusted and accordingly just embrace server-side access control for information privacy. Notwithstanding, security of information area and informed buyer can even now be derived from metadata, (for example, inquiry and access control guidelines) traded inside the DHS, yet little consideration has been put on its assurance. In this paper, we propose a novel methodology to save protection of numerous stakeholders included in the data expediting procedure. We are among the first to formally characterize two security attacks, namely attribute-correlation attack and inference attack, and propose two countermeasure plans automaton segmentation and query segment encryption to safely impart the directing choice making obligation among a chose set of expediting servers. With extensive security investigation and trial results, we indicate that our methodology flawlessly incorporates the security requirement with question steering to give framework wide security with inconsequential overhead.


Citation
K.Samunnisa,K.Tarakeswar,Dr.S.Prem Kumar."Privacy Preserving Information Brokering for Data Handling Frameworks". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.1, Issue 02,pp.84-89, August - 2014, URL :https://ijcert.org/ems/ijcert_papers/volume_1_Issue_2_paper_2.pdf,


Keywords : Access control, data offering, Privacy Preserving information brokering, Automaton segmentation, Commutative encryption

References
[1] F. Li, B. Luo, P. Liu, D. Lee, and C.-H.
Chu,‖Enforcing Secure and Privacy-Preserving
Information Brokering in Distributed Information
Sharing,‖ IEEE Transaction 2013.
[2] F. Li, B. Luo, P. Liu, D. Lee, and C.-H. Chu,
―Automaton segmentation:A new approach to
preserve privacy in XML information brokering,‖in
Proc. ACM CCS’07, 2007, pp. 508–518.
[3] E. Damiani, S. di Vimercati, S. Paraboschi, and
P.Samarati, ―Securing{XML} documents,‖ in Proc.
EDBT 2000, 2000, pp. 121–135.
[4] A. Carzaniga, M. J.Rutherford, andA.
L.Wolf,―Arouting scheme forcontent-based
networking,‖ in Proc.INFOCOM, Hong Kong,
2004,pp. 918–928
[5] Bart Kuijpers, Vanessa Lemmens, Bart Moelans,
―Privacy Preserving ID3 over Horizontally,
Vertically and Grid Partitioned Data‖, avrxi0803.155v1 [cs.db], 11 march 2008. Online:
http://arxiv.org/pdf/0803.1555.pdf
[6] Yaping Li, Minghua Chen, Qiwei Li, And Wei
Zhang ―Enabling Multilevel Trust In Privacy
Preserving Data Mining‖ , IEEE Transactions On
Knowledge And Data Engineering, Vol. 24, No.
9,September 2012.
[7] Kawatghare, Mr Mukesh, and Ms Pradnya
Kamble. "Review on Enforcing Secure And Privacy
Preserving Information Brokering In Distributed
Information Sharing", International Conference on
Advances in Engineering & Technology (ICAET),
ISSN: 2278 -0661, pp. 45-40, 2014.
[8] Srinivas, D. "Privacy-Preserving Public Auditing
In Cloud Storage Security." International Journal of
computer science and Information
Technologies,ISSN: 0975-9646, vol. 2, no. 6, pp.
2691-2693, 2011.
[9] Li, Fenjun, Bo Luo, Peng Liu, Dongwon Lee,
Prasenjit Mitra,Wang-Chien Lee, and Chao-Hsien
Chu "In-broker access control:Towards efficient endto-end performance of information brokerage
systems", In IEEE International Conference on
Sensor Networks,Ubiquitous, and Trustworthy
Computing, vol. 1, pp. 1-8-, 2006.
[10] Snoeren, Alex C., Kenneth Conley, and David
K. Gifford. "Meshbased content routing using XML."
ACM SIGOPS OperatingSystems Review 35, no. 5,
pp. 160-173, 2001.
[11] Koudas, Nick, Michael Rabinovich, Divesh
Srivastava, and Ting Yu. "Routing XML queries." In
Proceedings of IEEE 20th International Conference
on Data Engineering, pp. 844, 2004.
[12] Koloniari, Georgia, and Evaggelia Pitoura.
"Content-based routing of path queries in peer-topeer systems." In proceedings of Advances in
Database Technology-EDBT-2004, pp. 29-47,
Springer Berlin Heidelberg, 2004.
[9] A. Yao, ―Protocols for secure computations,‖ in
Proc. 23rd Ann. IEEE Symp. Foundations of
Computer Science, 1982, pp.160–164, IEEE
Computer Society.
[10] C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin,
and M. Y. Zhu, ―Tools for privacy preserving
distributed data mining,‖ ACM SIGKDD Expl


DOI Link : NOT ASSIGNED

Download :
  volume_1_Issue_2_paper_2.pdf


Refbacks : Currently there are no Refbacks

Announcements


Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors. 

News & Events


Latest issue :Volume 10 Issue 1 Articles In press

A plagiarism check will be implemented for all the articles using world-renowned software. Turnitin.


Digital Object Identifier will be assigned for all the articles being published in the Journal from September 2016 issue, i.e. Volume 3, Issue 9, 2016.


IJCERT is a member of the prestigious.Each of the IJCERT articles has its unique DOI reference.
DOI Prefix : 10.22362/ijcert


IJCERT is member of The Publishers International Linking Association, Inc. (“PILA”)


Emerging Sources Citation Index (in process)


IJCERT title is under evaluation by Scopus.


Key Dates


☞   INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞   LAST DATE OF SUBMISSION : 31st March 2023
☞  SUBMISSION TO FIRST DECISION :
In 7 Days
☞  FINAL DECISION :
IN 3 WEEKS FROM THE DAY OF SUBMISSION

Important Announcements


All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.

Citation Index


Citations Indices All
Citations 1026
h-index 14
i10-index 20
Source: Google Scholar

Acceptance Rate (By Year)


Acceptance Rate (By Year)
Year Rate
2021 10.8%
2020 13.6%
2019 15.9%
2018 14.5%
2017 16.6%
2016 15.8%
2015 18.2%
2014 20.6%

Important Links



Conference Proposal




DOI:10.22362/ijcert