Security Preservation Methods to Confidential Databases
Neha Gosai1, S. H. Patil2
1Neha Gosai, Department of Computer Engineering, Bharati Vidyapeeth Deemed University College of Engineering, Pune, Maharashtra, India.
2S. H. Patil, Department of Computer Engineering , Bharati Vidyapeeth Deemed University College of Engineering, Pune, Maharashtra, India.
Manuscript received on March 02, 2012. | Revised Manuscript received on March 31, 2012. | Manuscript published on April 30, 2012. | PP: 108-111 | Volume-1 Issue-4, April 2012 | Retrieval Number: D0291041412/2012©BEIESP

Open Access | Ethics and  Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Anonymization means to remove personal identifier or converted into non readable form by human to protect private or personal information. Data anonymization can be performed in different ways but in this paper k-anonymization approach is used. Suppose one person A having his own k-anonymous database and needs to determine whether database is still k-anonymous if tuple inserted by another person B. For some applications (for example, Student’s record), database needs to be confidential, So access to the database is strictly controlled. The confidentiality of the database managed by the owner is violated once others have access to the contents of the database. Thus, Problem is to check whether the database inserted with the tuple is still k-anonymous without letting the owner A and others (B) to know the content of the tuple and database respectively. In this paper, we propose a protocol solving this problem on suppression based k-anonymous and confidential database.
Keywords: Anonymization, Privacy ,Confidentiality, Anonymous.