Privacy Preservation Techniques for Secure Data Broadcasting using in Distributed Environments

Rohit Ravindra Nikam, Rekha Shahapurkar
{"title":"Privacy Preservation Techniques for Secure Data Broadcasting using in Distributed Environments","authors":"Rohit Ravindra Nikam, Rekha Shahapurkar","doi":"10.52783/cienceng.v11i1.365","DOIUrl":null,"url":null,"abstract":"This Data security and privacy are essential things nowadays due to a large amount of sensitive data broadcasting on social media websites. Most of Internet of Things (IoT) and health care applications having quite challenges to achieve privacy preservation when number of distributed resources has involved during the data broadcasting. In this paper, we proposed a distributed data analysis and privacy preservation framework. In this paper, we introduced numerous privacy preservation techniques during data distribution to achieve high privacy. Some traditional methods, data anonymization, generalization, random permutation, specialization, top-down and bottom-up data generalization, fingerprint insertion etc., are also evaluated on extensive data when distributing with multi parties: the proposed one-way hashing privacy, XOR operation for generating multiple secure copies. First, we develop a few dynamic policies for each copy using XOR operation and insert fingerprints in individual documents. The collaboration of XOR operation and custom policies archives higher security from internal as well as external attacks. On the other hand, the data recovery approach has been designed to extract a fingerprint from secure copies. In the extensive experimental analysis, we evaluate proposed results with numerous existing systems and show the effectiveness of proposed modules in a distributed environment.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceeding International Conference on Science and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.52783/cienceng.v11i1.365","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This Data security and privacy are essential things nowadays due to a large amount of sensitive data broadcasting on social media websites. Most of Internet of Things (IoT) and health care applications having quite challenges to achieve privacy preservation when number of distributed resources has involved during the data broadcasting. In this paper, we proposed a distributed data analysis and privacy preservation framework. In this paper, we introduced numerous privacy preservation techniques during data distribution to achieve high privacy. Some traditional methods, data anonymization, generalization, random permutation, specialization, top-down and bottom-up data generalization, fingerprint insertion etc., are also evaluated on extensive data when distributing with multi parties: the proposed one-way hashing privacy, XOR operation for generating multiple secure copies. First, we develop a few dynamic policies for each copy using XOR operation and insert fingerprints in individual documents. The collaboration of XOR operation and custom policies archives higher security from internal as well as external attacks. On the other hand, the data recovery approach has been designed to extract a fingerprint from secure copies. In the extensive experimental analysis, we evaluate proposed results with numerous existing systems and show the effectiveness of proposed modules in a distributed environment.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
分布式环境下安全数据广播的隐私保护技术
由于社交媒体网站上大量的敏感数据传播,数据安全和隐私是必不可少的事情。当数据广播过程中涉及到大量分布式资源时,大多数物联网和医疗保健应用都面临着隐私保护的挑战。在本文中,我们提出了一个分布式数据分析和隐私保护框架。在本文中,我们引入了多种数据分发过程中的隐私保护技术来实现高隐私。对数据匿名化、泛化、随机排列、专门化、自顶向下和自底向上的数据泛化、指纹插入等传统方法在广泛数据多方分布时进行了评价:提出的单向哈希隐私、生成多个安全副本的XOR操作。首先,我们使用异或操作为每个副本开发一些动态策略,并在单个文档中插入指纹。异或操作和自定义策略的协作可为内部和外部攻击提供更高的安全性。另一方面,数据恢复方法被设计为从安全副本中提取指纹。在广泛的实验分析中,我们用许多现有系统评估了所提出的结果,并展示了所提出模块在分布式环境中的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Impact of Cloud-Based HR Systems on Business Performance Metrics Use of Gesture Recognition for Differently Abled Persons Study on Lead Iodide-Polyvinyl Alcohol Polymer Composites as an X-ray Shielding Material A Novel Heterogenous Dominant Sequence Clustering for Task Scheduling and Optimal Load Balancing Using JSO in Cloud Motivational Theories and Their Relevance in Military Motivation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1