In this Paper, we propose a new framework for secure multi-party computation that uses ambiguous user's identity. A huge amount of a potentially sensitive data exists in large a organization that needs to be mined...
详细信息
In this Paper, we propose a new framework for secure multi-party computation that uses ambiguous user's identity. A huge amount of a potentially sensitive data exists in large a organization that needs to be mined. This raises concerns for people involved in the increased usage of data mining tools in both the public and private sectors. The utility to be gained from widespread data mining seems to come into direct conflict with an individual's need and right to privacy. A privacy preserving data mining solution aims at achieving the somewhat paradoxical property of enabling a data-mining algorithm to use data without ever actually "seeing" it. Thus, the benefits of data mining can be enjoyed, without compromising the privacy of concerned individuals. The very nature of huge amount of data during the mining needs to have such a framework with security. We propose the framework in the form a protocol for secure multiparty computation during data mining for BPO application. We also provide a suitable architecture that is tuned for this protocol to function.
The growth of the Internet has prompted tremendous opportunities for cooperative computation, where people are jointly conducting computation tasks based on the private inputs they each supplies. These computations ca...
详细信息
ISBN:
(纸本)9780769542621
The growth of the Internet has prompted tremendous opportunities for cooperative computation, where people are jointly conducting computation tasks based on the private inputs they each supplies. These computations can occur between mutually untrusted parties, or even between competitors. For example, customers might send to a remote database queries that contain private information; two competing financial organizations might jointly invest in a project that must satisfy both organizations private and valuable constraints, and so on. Today, to conduct such computations, one entity must usually know the inputs from all the participants; however if nobody can be trusted enough to know all the inputs, privacy will become a primary concern. This problem is referred to as Secure Multiparty Computation Problem (SMC) in the literature. research in the SMC area has been focusing on only a limited set of specific SMC problems, while privacy concerned cooperative computations call for SMC studies in a variety of computation domains. Before we can study the problems, we need to identify and define the specific SMC problems for those computation domains. We have developed a scaffold to facilitate this problem-discovery task. Based on our framework, we have identified and defined a number of SMC problems for a range of computation domains. The goal of this paper is not only to present our results, but also to serve as a guideline so other people can identify useful SMC problems in their own computation fields. During computation of inputs, we had also considered the factor, what if trusted third parties are malicious? Considering different probabilities for the malicious users, we have tried to find out the correctness of the result and percentage of system acceptability. We then tried to increase the number of TTP's in order to get the accuracy of the result. The aim of our proposed work is to identify what probability of malicious users will lead to the system in an unaccepta
This book presents a selection of revised and extended versions of the best papers from the First International Conference on Social Networking and Computational Intelligence (SCI-2018), held in Bhopal, India, from Oc...
详细信息
ISBN:
(数字)9789811520716
ISBN:
(纸本)9789811520709
This book presents a selection of revised and extended versions of the best papers from the First International Conference on Social Networking and Computational Intelligence (SCI-2018), held in Bhopal, India, from October 5 to 6, 2018. It discusses recent advances in scientific developments and applications in these areas.
The book covers current developments in the field of expert applications and security, which employ advances of next-generation communication and computational technology to shape real-world applications. It gathers s...
详细信息
ISBN:
(数字)9789811322853
ISBN:
(纸本)9789811322846
The book covers current developments in the field of expert applications and security, which employ advances of next-generation communication and computational technology to shape real-world applications. It gathers selected research papers presented at the ICETEAS 2018 conference, which was held at Jaipur engineering College and research Centre, Jaipur, India, on February 17–18, 2018. Key topics covered include expert applications and artificial intelligence; information and application security; advanced computing; multimedia applications in forensics, security and intelligence; and advances in web technologies: implementation and security issues.
This book provides insights of World Conference on Smart Trends in Systems, Security and Sustainability (WS4 2022) which is divided into different sections such as Smart IT Infrastructure for Sustainable Society; Smar...
详细信息
ISBN:
(数字)9789811976605
ISBN:
(纸本)9789811976599
This book provides insights of World Conference on Smart Trends in Systems, Security and Sustainability (WS4 2022) which is divided into different sections such as Smart IT Infrastructure for Sustainable Society; Smart Management Prospective for Sustainable Society; Smart Secure Systems for Next Generation Technologies; Smart Trends for Computational Graphics and Image Modeling; and Smart Trends for Biomedical and Health Informatics. The proceedings is presented in two volumes. The book is helpful for active researchers and practitioners in the field.
暂无评论