Impact Factor:6.549
 Scopus Suggested Journal: Tracking ID for this title suggestion is: 55EC484EE39417F0

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary

Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Privacy Preserving Information Brokering for Data Handling Frameworks

K.Samunnisa, K.Tarakeswar, Dr.S.Prem Kumar, ,
M.Tech Research Scholar</br>Assistant Professor</br>Head of the Department Department of CSE, G.Pullaiah College of Engineering and Technology, Kurnool JNTU Anatapur, Andhra Pradesh, India

In recent year’s organizations heave rising require for data imparting through oninterest access. Data handling frameworks have been proposed to associate vast scale inexactly unified information sources through a facilitating overlay, in which the intermediaries settle on steering choices to regulate customer questions to the asked for information servers. Numerous existing data handling frameworks expect that agents are trusted and accordingly just embrace server-side access control for information privacy. Notwithstanding, security of information area and informed buyer can even now be derived from metadata, (for example, inquiry and access control guidelines) traded inside the DHS, yet little consideration has been put on its assurance. In this paper, we propose a novel methodology to save protection of numerous stakeholders included in the data expediting procedure. We are among the first to formally characterize two security attacks, namely attribute-correlation attack and inference attack, and propose two countermeasure plans automaton segmentation and query segment encryption to safely impart the directing choice making obligation among a chose set of expediting servers. With extensive security investigation and trial results, we indicate that our methodology flawlessly incorporates the security requirement with question steering to give framework wide security with inconsequential overhead.

K.Samunnisa,K.Tarakeswar,Dr.S.Prem Kumar."Privacy Preserving Information Brokering for Data Handling Frameworks". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.1, Issue 02,pp.84-89, August - 2014, URL :,

Keywords : Access control, data offering, Privacy Preserving information brokering, Automaton segmentation, Commutative encryption

[1] F. Li, B. Luo, P. Liu, D. Lee, and C.-H.
Chu,‖Enforcing Secure and Privacy-Preserving
Information Brokering in Distributed Information
Sharing,‖ IEEE Transaction 2013.
[2] F. Li, B. Luo, P. Liu, D. Lee, and C.-H. Chu,
―Automaton segmentation:A new approach to
preserve privacy in XML information brokering,‖in
Proc. ACM CCS’07, 2007, pp. 508–518.
[3] E. Damiani, S. di Vimercati, S. Paraboschi, and
P.Samarati, ―Securing{XML} documents,‖ in Proc.
EDBT 2000, 2000, pp. 121–135.
[4] A. Carzaniga, M. J.Rutherford, andA.
L.Wolf,―Arouting scheme forcontent-based
networking,‖ in Proc.INFOCOM, Hong Kong,
2004,pp. 918–928
[5] Bart Kuijpers, Vanessa Lemmens, Bart Moelans,
―Privacy Preserving ID3 over Horizontally,
Vertically and Grid Partitioned Data‖, avrxi0803.155v1 [cs.db], 11 march 2008. Online:
[6] Yaping Li, Minghua Chen, Qiwei Li, And Wei
Zhang ―Enabling Multilevel Trust In Privacy
Preserving Data Mining‖ , IEEE Transactions On
Knowledge And Data Engineering, Vol. 24, No.
9,September 2012.
[7] Kawatghare, Mr Mukesh, and Ms Pradnya
Kamble. "Review on Enforcing Secure And Privacy
Preserving Information Brokering In Distributed
Information Sharing", International Conference on
Advances in Engineering & Technology (ICAET),
ISSN: 2278 -0661, pp. 45-40, 2014.
[8] Srinivas, D. "Privacy-Preserving Public Auditing
In Cloud Storage Security." International Journal of
computer science and Information
Technologies,ISSN: 0975-9646, vol. 2, no. 6, pp.
2691-2693, 2011.
[9] Li, Fenjun, Bo Luo, Peng Liu, Dongwon Lee,
Prasenjit Mitra,Wang-Chien Lee, and Chao-Hsien
Chu "In-broker access control:Towards efficient endto-end performance of information brokerage
systems", In IEEE International Conference on
Sensor Networks,Ubiquitous, and Trustworthy
Computing, vol. 1, pp. 1-8-, 2006.
[10] Snoeren, Alex C., Kenneth Conley, and David
K. Gifford. "Meshbased content routing using XML."
ACM SIGOPS OperatingSystems Review 35, no. 5,
pp. 160-173, 2001.
[11] Koudas, Nick, Michael Rabinovich, Divesh
Srivastava, and Ting Yu. "Routing XML queries." In
Proceedings of IEEE 20th International Conference
on Data Engineering, pp. 844, 2004.
[12] Koloniari, Georgia, and Evaggelia Pitoura.
"Content-based routing of path queries in peer-topeer systems." In proceedings of Advances in
Database Technology-EDBT-2004, pp. 29-47,
Springer Berlin Heidelberg, 2004.
[9] A. Yao, ―Protocols for secure computations,‖ in
Proc. 23rd Ann. IEEE Symp. Foundations of
Computer Science, 1982, pp.160–164, IEEE
Computer Society.
[10] C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin,
and M. Y. Zhu, ―Tools for privacy preserving
distributed data mining,‖ ACM SIGKDD Expl


Download :

Refbacks : Currently there are no Refbacks

Support Us

We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.

Quick Links


Science Central

Score: 13.30

Submit your paper to