Article,

A Novel Approach for Cryptography Technique on Perturbed Data for Distributed Environment

.
International Journal on Cryptography and Information Security (IJCIS), 2 (3): 101-106 (September 2012)

Abstract

Using the methods of data mining, one can search for large patterns in the huge database system. Now with the amassedevolution of technology, the data requirements and the amount of the data will significantly increase. Therefore, the data mining users,uses new methods for pattern matching which can be used for decision making. The data stored by the organizations are in a bulk. Therefore, when user gives a particular query, the amount of important or secure data can also be revealed as an answer of a query. This can harm to reputation of an organization. Therefore, privacy can concern to the above issue that not reveals any such kind of information about data provider and vice versa. Therefore, data needs to be modified without losing the data integrity. This paper outlines a method that achieve confidentiality from client and owner side which relatively less size of cipher text through mediator. We have extended the paper by Nishant et al. in CNSA-2012 to prevent the long term secret attack.

Tags

Users

  • @alinta

Comments and Reviews