SlideShare uma empresa Scribd logo
1 de 14
m-Privacy for Collaborative Data Publishing
ABSTRACT:
In this paper, we consider the collaborative data publishing problem for
anonymizing horizontally partitioned data at multiple data providers. We consider
a new type of “insider attack” by colluding data providers who may use their own
data records (a subset of the overall data) to infer the data records contributed by
other data providers. The paper addresses this new threat, and makes several
contributions. First, we introduce the notion of m-privacy, which guarantees that
the anonymized data satisfies a given privacy constraint against any group of up to
m colluding data providers. Second, we present heuristic algorithms exploiting the
monotonicity of privacy constraints for efficiently checking m-privacy given a
group of records. Third, we present a data provider-aware anonymization
algorithm with adaptive m-privacy checking strategies to ensure high utility and m-
privacy of anonymized data with efficiency. Finally, we propose secure multi-party
computation protocols for collaborative data publishing with m-privacy. All
protocols are extensively analyzed and their security and efficiency are formally
proved. Experiments on real-life datasets suggest that our approach achieves better
or comparable utility and efficiency than existing and baseline algorithms while
satisfying m-privacy.
EXISTING SYSTEM:
Most work has focused on a single data provider setting and considered the data
recipient as an attacker. A large body of literature assumes limited background
knowledge of the attacker, and defines privacy using relaxed adversarial notion by
considering specific types of attacks. Representative principles include k-
anonymity, ldiversity, and t-closeness. A few recent works have modeled the
instance level background knowledge as corruption, and studied perturbation
techniques under these syntactic privacy notions
DISADVANTAGES OF EXISTING SYSTEM:
1. Collaborative data publishing can be considered as a multi-party computation
problem, in which multiple providers wish to compute an anonymized view of
their data without disclosing any private and sensitive information
2. The problem of inferring information from anonymized data has been widely
studied in a single data provider setting. A data recipient that is an attacker, e.g.,
P0, attempts to infer additional information about data records using the published
data, T , and background knowledge, BK.
PROPOSED SYSTEM:
We consider the collaborative data publishing setting with horizontally partitioned
data across multiple data providers, each contributing a subset of records Ti. As a
special case, a data provider could be the data owner itself who is contributing its
own records. This is a very common scenario in social networking and
recommendation systems. Our goal is to publish an anonymized view of the
integrated data such that a data recipient including the data providers will not be
able to compromise the privacy of the individual records provided by other parties.
ADVANTAGES OF PROPOSED SYSTEM:
Compared to our preliminary version, our new contributions extend above results.
First, we adapt privacy verification and anonymization mechanisms to work for m-
privacy with respect to any privacy constraint, including nonmonotonic ones. We
list all necessary privacy checks and prove that no fewer checks are enough to
confirm m-privacy. Second, we propose SMC protocols for secure m-privacy
verification and anonymization. For all protocols we prove their security,
complexity and experimentally confirm their efficiency.
Modules:
1. Patient Registration
2. Attacks by External Data Recipient Using Anonymized Data
3. Attacks by Data Providers Using Anonymized Data and Their Own Data
4. Doctor Login
5. Admin Login
Modules Description
Patient Registration:
In this module if patients have to take treatment, he/she should register their details
like Name, Age, and Disease they get affected, Email etc. These details are
maintained in a Database by the Hospital management. Only Doctors can see all
their details. Patient can only see his own record.
Based on this paper:
When the data are distributed among multiple data providers or data owners, two
main settings are used for anonymization. One approach is for each provider to
anonymize the data independently (anonymize-and-aggregate, Figure 1A), which
results in potential loss of integrated data utility. A more desirable approach is
collaborative data publishing which anonymize data from all Providers as if they
would come from one source (aggregate-and-anonymize, Figure 1B), using either a
trusted third-party(TTP) or Secure Multi-party Computation (SMC) protocols to do
computations .
Attacks by External Data Recipient Using Anonymized Data:
A data recipient, e.g. P0, could be an attacker and attempts to infer additional
information about the records using the published data (T∗) and some background
knowledge (BK) such as publicly available external data.
Attacks by Data Providers Using Anonymized Data and Their Own
Data:
Each data provider, such as P1 in Figure 1, can also use anonymized data T∗ and
his own data (T1) to infer additional information about other records. Compared to
the attack by the external recipient in the first attack scenario, each provider has
additional data knowledge of their own records, which can help with the attack.
This issue can be further worsened when multiple data providers collude with each
other.
FIGURE 1
FIGURE: 2
Doctor Login:
In this module Doctor can see all the patients details and will get
the background knowledge(BK),by the chance he will see horizontally partitioned
data of distributed data base of the group of hospitals and can see how many
patients are affected without knowing of individual records of the patients and
sensitive information about the individuals.
Admin Login:
In this module Admin acts as Trusted Third Party (TTP).He can see all
individual records and their sensitive information among the overall hospital
distributed data base. Anonymation can be done by this people. He/She collected
information’s from various hospitals and grouped into each other and make them
as an anonymized data.
SYSTEM ARCHITECTURE:
ALGORITHM USED
:
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA
 Java Version : JDK 1.6 & above.
REFERENCE:
Slawomir Goryczka, Li Xiong, and Benjamin C. M. Fung-“m-Privacy for
Collaborative Data Publishing”- IEEE TRANSACTIONS ON KNOWLEDGE
AND DATA ENGINEERING” 2013.

Mais conteúdo relacionado

Destaque

Localization of wireless sensor networks in the wild pursuit of ranging quality
Localization of wireless sensor networks in the wild pursuit of ranging qualityLocalization of wireless sensor networks in the wild pursuit of ranging quality
Localization of wireless sensor networks in the wild pursuit of ranging qualityJPINFOTECH JAYAPRAKASH
 
A load balancing model based on cloud partitioning for the public cloud
A load balancing model based on cloud partitioning for the public cloudA load balancing model based on cloud partitioning for the public cloud
A load balancing model based on cloud partitioning for the public cloudJPINFOTECH JAYAPRAKASH
 
Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...JPINFOTECH JAYAPRAKASH
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...JPINFOTECH JAYAPRAKASH
 
Delay based network utility maximization
Delay based network utility maximizationDelay based network utility maximization
Delay based network utility maximizationJPINFOTECH JAYAPRAKASH
 
Intrusion detection technique by using k means, fuzzy neural network and svm ...
Intrusion detection technique by using k means, fuzzy neural network and svm ...Intrusion detection technique by using k means, fuzzy neural network and svm ...
Intrusion detection technique by using k means, fuzzy neural network and svm ...JPINFOTECH JAYAPRAKASH
 
Optimal multicast capacity and delay tradeoffs in mane ts
Optimal multicast capacity and delay tradeoffs in mane tsOptimal multicast capacity and delay tradeoffs in mane ts
Optimal multicast capacity and delay tradeoffs in mane tsJPINFOTECH JAYAPRAKASH
 
An efficient and robust addressing protocol for node autoconfiguration in ad ...
An efficient and robust addressing protocol for node autoconfiguration in ad ...An efficient and robust addressing protocol for node autoconfiguration in ad ...
An efficient and robust addressing protocol for node autoconfiguration in ad ...JPINFOTECH JAYAPRAKASH
 
Load rebalancing for distributed file systems in clouds
Load rebalancing for distributed file systems in cloudsLoad rebalancing for distributed file systems in clouds
Load rebalancing for distributed file systems in cloudsJPINFOTECH JAYAPRAKASH
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...JPINFOTECH JAYAPRAKASH
 
Research in progress defending android smartphones from malware attacks
Research in progress  defending android smartphones from malware attacksResearch in progress  defending android smartphones from malware attacks
Research in progress defending android smartphones from malware attacksJPINFOTECH JAYAPRAKASH
 
A probabilistic misbehavior detection scheme towards efficient trust establis...
A probabilistic misbehavior detection scheme towards efficient trust establis...A probabilistic misbehavior detection scheme towards efficient trust establis...
A probabilistic misbehavior detection scheme towards efficient trust establis...JPINFOTECH JAYAPRAKASH
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringJPINFOTECH JAYAPRAKASH
 
Enhanced olsr for defense against dos attack in ad hoc networks
Enhanced olsr for defense against dos attack in ad hoc networksEnhanced olsr for defense against dos attack in ad hoc networks
Enhanced olsr for defense against dos attack in ad hoc networksJPINFOTECH JAYAPRAKASH
 
A rank correlation based detection against distributed reflection do s attacks
A rank correlation based detection against distributed reflection do s attacksA rank correlation based detection against distributed reflection do s attacks
A rank correlation based detection against distributed reflection do s attacksJPINFOTECH JAYAPRAKASH
 
A generalized flow based method for analysis of implicit relationships on wik...
A generalized flow based method for analysis of implicit relationships on wik...A generalized flow based method for analysis of implicit relationships on wik...
A generalized flow based method for analysis of implicit relationships on wik...JPINFOTECH JAYAPRAKASH
 
Toward accurate mobile sensor network localization in noisy environments
Toward accurate mobile sensor network localization in noisy environmentsToward accurate mobile sensor network localization in noisy environments
Toward accurate mobile sensor network localization in noisy environmentsJPINFOTECH JAYAPRAKASH
 

Destaque (19)

Localization of wireless sensor networks in the wild pursuit of ranging quality
Localization of wireless sensor networks in the wild pursuit of ranging qualityLocalization of wireless sensor networks in the wild pursuit of ranging quality
Localization of wireless sensor networks in the wild pursuit of ranging quality
 
A load balancing model based on cloud partitioning for the public cloud
A load balancing model based on cloud partitioning for the public cloudA load balancing model based on cloud partitioning for the public cloud
A load balancing model based on cloud partitioning for the public cloud
 
Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...
 
2013 14 ieee matlab titles
2013 14 ieee matlab titles2013 14 ieee matlab titles
2013 14 ieee matlab titles
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Delay based network utility maximization
Delay based network utility maximizationDelay based network utility maximization
Delay based network utility maximization
 
Intrusion detection technique by using k means, fuzzy neural network and svm ...
Intrusion detection technique by using k means, fuzzy neural network and svm ...Intrusion detection technique by using k means, fuzzy neural network and svm ...
Intrusion detection technique by using k means, fuzzy neural network and svm ...
 
Optimal multicast capacity and delay tradeoffs in mane ts
Optimal multicast capacity and delay tradeoffs in mane tsOptimal multicast capacity and delay tradeoffs in mane ts
Optimal multicast capacity and delay tradeoffs in mane ts
 
An efficient and robust addressing protocol for node autoconfiguration in ad ...
An efficient and robust addressing protocol for node autoconfiguration in ad ...An efficient and robust addressing protocol for node autoconfiguration in ad ...
An efficient and robust addressing protocol for node autoconfiguration in ad ...
 
Load rebalancing for distributed file systems in clouds
Load rebalancing for distributed file systems in cloudsLoad rebalancing for distributed file systems in clouds
Load rebalancing for distributed file systems in clouds
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...
 
Research in progress defending android smartphones from malware attacks
Research in progress  defending android smartphones from malware attacksResearch in progress  defending android smartphones from malware attacks
Research in progress defending android smartphones from malware attacks
 
2013 2014 ieee java project titles
2013 2014 ieee java project titles2013 2014 ieee java project titles
2013 2014 ieee java project titles
 
A probabilistic misbehavior detection scheme towards efficient trust establis...
A probabilistic misbehavior detection scheme towards efficient trust establis...A probabilistic misbehavior detection scheme towards efficient trust establis...
A probabilistic misbehavior detection scheme towards efficient trust establis...
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
 
Enhanced olsr for defense against dos attack in ad hoc networks
Enhanced olsr for defense against dos attack in ad hoc networksEnhanced olsr for defense against dos attack in ad hoc networks
Enhanced olsr for defense against dos attack in ad hoc networks
 
A rank correlation based detection against distributed reflection do s attacks
A rank correlation based detection against distributed reflection do s attacksA rank correlation based detection against distributed reflection do s attacks
A rank correlation based detection against distributed reflection do s attacks
 
A generalized flow based method for analysis of implicit relationships on wik...
A generalized flow based method for analysis of implicit relationships on wik...A generalized flow based method for analysis of implicit relationships on wik...
A generalized flow based method for analysis of implicit relationships on wik...
 
Toward accurate mobile sensor network localization in noisy environments
Toward accurate mobile sensor network localization in noisy environmentsToward accurate mobile sensor network localization in noisy environments
Toward accurate mobile sensor network localization in noisy environments
 

Semelhante a M privacy for collaborative data publishing

JAVA 2013 IEEE DATAMINING PROJECT m-Privacy for Collaborative Data Publishing
JAVA 2013 IEEE DATAMINING PROJECT m-Privacy for Collaborative Data PublishingJAVA 2013 IEEE DATAMINING PROJECT m-Privacy for Collaborative Data Publishing
JAVA 2013 IEEE DATAMINING PROJECT m-Privacy for Collaborative Data PublishingIEEEGLOBALSOFTTECHNOLOGIES
 
2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishing
2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishing2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishing
2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishingIEEEMEMTECHSTUDENTSPROJECTS
 
m-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data Publishingm-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data PublishingMigrant Systems
 
Incentive compatible privacy preserving data analysis
Incentive compatible privacy preserving data analysisIncentive compatible privacy preserving data analysis
Incentive compatible privacy preserving data analysisJPINFOTECH JAYAPRAKASH
 
Preserving Privacy and Security for Information Brokering System in Distribut...
Preserving Privacy and Security for Information Brokering System in Distribut...Preserving Privacy and Security for Information Brokering System in Distribut...
Preserving Privacy and Security for Information Brokering System in Distribut...Shruti Sk S K
 
Anonymity based privacy-preserving data
Anonymity based privacy-preserving dataAnonymity based privacy-preserving data
Anonymity based privacy-preserving dataKamal Spring
 
Final review m score
Final review m scoreFinal review m score
Final review m scoreazhar4010
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET Journal
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detectionChaitanya Kn
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET Journal
 
Dn31538540
Dn31538540Dn31538540
Dn31538540IJMER
 
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data MiningPerformance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Miningidescitation
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...IEEEGLOBALSOFTTECHNOLOGIES
 
Utility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachUtility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachIEEEFINALYEARPROJECTS
 
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Kumar Goud
 
Privacy preserving dm_ppt
Privacy preserving dm_pptPrivacy preserving dm_ppt
Privacy preserving dm_pptSagar Verma
 

Semelhante a M privacy for collaborative data publishing (20)

JAVA 2013 IEEE DATAMINING PROJECT m-Privacy for Collaborative Data Publishing
JAVA 2013 IEEE DATAMINING PROJECT m-Privacy for Collaborative Data PublishingJAVA 2013 IEEE DATAMINING PROJECT m-Privacy for Collaborative Data Publishing
JAVA 2013 IEEE DATAMINING PROJECT m-Privacy for Collaborative Data Publishing
 
2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishing
2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishing2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishing
2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishing
 
Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...
 
m-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data Publishingm-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data Publishing
 
ϵ-DIFFERENTIAL PRIVACY MODEL FOR VERTICALLY PARTITIONED DATA TO SECURE THE PR...
ϵ-DIFFERENTIAL PRIVACY MODEL FOR VERTICALLY PARTITIONED DATA TO SECURE THE PR...ϵ-DIFFERENTIAL PRIVACY MODEL FOR VERTICALLY PARTITIONED DATA TO SECURE THE PR...
ϵ-DIFFERENTIAL PRIVACY MODEL FOR VERTICALLY PARTITIONED DATA TO SECURE THE PR...
 
Incentive compatible privacy preserving data analysis
Incentive compatible privacy preserving data analysisIncentive compatible privacy preserving data analysis
Incentive compatible privacy preserving data analysis
 
Privacy preserving
Privacy preservingPrivacy preserving
Privacy preserving
 
Preserving Privacy and Security for Information Brokering System in Distribut...
Preserving Privacy and Security for Information Brokering System in Distribut...Preserving Privacy and Security for Information Brokering System in Distribut...
Preserving Privacy and Security for Information Brokering System in Distribut...
 
Anonymity based privacy-preserving data
Anonymity based privacy-preserving dataAnonymity based privacy-preserving data
Anonymity based privacy-preserving data
 
Final review m score
Final review m scoreFinal review m score
Final review m score
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detection
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
 
Dn31538540
Dn31538540Dn31538540
Dn31538540
 
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data MiningPerformance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
 
Ib3514141422
Ib3514141422Ib3514141422
Ib3514141422
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...
 
Utility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachUtility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approach
 
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
 
Privacy preserving dm_ppt
Privacy preserving dm_pptPrivacy preserving dm_ppt
Privacy preserving dm_ppt
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 

Último (20)

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

M privacy for collaborative data publishing

  • 1. m-Privacy for Collaborative Data Publishing ABSTRACT: In this paper, we consider the collaborative data publishing problem for anonymizing horizontally partitioned data at multiple data providers. We consider a new type of “insider attack” by colluding data providers who may use their own data records (a subset of the overall data) to infer the data records contributed by other data providers. The paper addresses this new threat, and makes several contributions. First, we introduce the notion of m-privacy, which guarantees that the anonymized data satisfies a given privacy constraint against any group of up to m colluding data providers. Second, we present heuristic algorithms exploiting the monotonicity of privacy constraints for efficiently checking m-privacy given a group of records. Third, we present a data provider-aware anonymization algorithm with adaptive m-privacy checking strategies to ensure high utility and m- privacy of anonymized data with efficiency. Finally, we propose secure multi-party computation protocols for collaborative data publishing with m-privacy. All protocols are extensively analyzed and their security and efficiency are formally proved. Experiments on real-life datasets suggest that our approach achieves better
  • 2. or comparable utility and efficiency than existing and baseline algorithms while satisfying m-privacy. EXISTING SYSTEM: Most work has focused on a single data provider setting and considered the data recipient as an attacker. A large body of literature assumes limited background knowledge of the attacker, and defines privacy using relaxed adversarial notion by considering specific types of attacks. Representative principles include k- anonymity, ldiversity, and t-closeness. A few recent works have modeled the instance level background knowledge as corruption, and studied perturbation techniques under these syntactic privacy notions DISADVANTAGES OF EXISTING SYSTEM: 1. Collaborative data publishing can be considered as a multi-party computation problem, in which multiple providers wish to compute an anonymized view of their data without disclosing any private and sensitive information 2. The problem of inferring information from anonymized data has been widely studied in a single data provider setting. A data recipient that is an attacker, e.g.,
  • 3. P0, attempts to infer additional information about data records using the published data, T , and background knowledge, BK. PROPOSED SYSTEM: We consider the collaborative data publishing setting with horizontally partitioned data across multiple data providers, each contributing a subset of records Ti. As a special case, a data provider could be the data owner itself who is contributing its own records. This is a very common scenario in social networking and recommendation systems. Our goal is to publish an anonymized view of the integrated data such that a data recipient including the data providers will not be able to compromise the privacy of the individual records provided by other parties. ADVANTAGES OF PROPOSED SYSTEM: Compared to our preliminary version, our new contributions extend above results. First, we adapt privacy verification and anonymization mechanisms to work for m- privacy with respect to any privacy constraint, including nonmonotonic ones. We list all necessary privacy checks and prove that no fewer checks are enough to confirm m-privacy. Second, we propose SMC protocols for secure m-privacy verification and anonymization. For all protocols we prove their security, complexity and experimentally confirm their efficiency.
  • 4. Modules: 1. Patient Registration 2. Attacks by External Data Recipient Using Anonymized Data 3. Attacks by Data Providers Using Anonymized Data and Their Own Data 4. Doctor Login 5. Admin Login Modules Description Patient Registration: In this module if patients have to take treatment, he/she should register their details like Name, Age, and Disease they get affected, Email etc. These details are maintained in a Database by the Hospital management. Only Doctors can see all their details. Patient can only see his own record. Based on this paper:
  • 5. When the data are distributed among multiple data providers or data owners, two main settings are used for anonymization. One approach is for each provider to anonymize the data independently (anonymize-and-aggregate, Figure 1A), which results in potential loss of integrated data utility. A more desirable approach is collaborative data publishing which anonymize data from all Providers as if they would come from one source (aggregate-and-anonymize, Figure 1B), using either a trusted third-party(TTP) or Secure Multi-party Computation (SMC) protocols to do computations . Attacks by External Data Recipient Using Anonymized Data: A data recipient, e.g. P0, could be an attacker and attempts to infer additional information about the records using the published data (T∗) and some background knowledge (BK) such as publicly available external data. Attacks by Data Providers Using Anonymized Data and Their Own Data: Each data provider, such as P1 in Figure 1, can also use anonymized data T∗ and his own data (T1) to infer additional information about other records. Compared to the attack by the external recipient in the first attack scenario, each provider has additional data knowledge of their own records, which can help with the attack.
  • 6. This issue can be further worsened when multiple data providers collude with each other. FIGURE 1
  • 7. FIGURE: 2 Doctor Login: In this module Doctor can see all the patients details and will get the background knowledge(BK),by the chance he will see horizontally partitioned data of distributed data base of the group of hospitals and can see how many patients are affected without knowing of individual records of the patients and sensitive information about the individuals. Admin Login: In this module Admin acts as Trusted Third Party (TTP).He can see all individual records and their sensitive information among the overall hospital distributed data base. Anonymation can be done by this people. He/She collected information’s from various hospitals and grouped into each other and make them as an anonymized data.
  • 10.
  • 11.
  • 12.
  • 13. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 14. SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above. REFERENCE: Slawomir Goryczka, Li Xiong, and Benjamin C. M. Fung-“m-Privacy for Collaborative Data Publishing”- IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING” 2013.