International Conference and workshop on Advanced Computing 2013 |
Foundation of Computer Science USA |
ICWAC - Number 4 |
July 2013 |
Authors: Poonam B Joshi, Prashant Jawade |
eb681092-47c1-4f19-8d93-68f1ab1079c8 |
Poonam B Joshi, Prashant Jawade . Securing Anonymous and Confidential Database through Privacy Preserving Updates. International Conference and workshop on Advanced Computing 2013. ICWAC, 4 (July 2013), 0-0.
Typically for economic gain, someone wrongfully obtains and uses another person's personal data in a way that involves fraud or deception. So Privacy of database is a necessity. In this paper we propose a system of updating the confidential database with preserving the privacy of it. Anonymization means identifying information is removed from original data to protect personal or private information. Data anonymization can be performed in different ways but in this paper k-anonymization approach is used. Suppose one person X having his own k-anonymous database and needs to determine whether database is still k-anonymous if tuple inserted by another person Y. For some applications (for example, Patient's record), database needs to be confidential, so access to the database is strictly controlled. The confidentiality of the database managed by the owner is violated once others have access to the contents of the database. Thus, problem is to check whether the database inserted with the tuple is still k-anonymous without letting the owner X and others (Y) to know the content of the tuple and database respectively. In this paper, we propose two methods solving this problem on suppression and generalization based k-anonymous and confidential database. Beside we are dealing with the case of malicious parties by the introduction of non-colluding third party.