Data Hiding and Secured Data Storage with Access Control towards Multiparty Protocols
T.S. Keerthiga1, S.Sarika2
1T.S. Keerthiga, Computer Science and Engineering, Sathyabama University, Chennai, (T.N), India.
2S.Sarika, Computer Science and Engineering, Sathyabama University, Chennai, (T.N), India.
Manuscript received on March 21, 2014. | Revised Manuscript received on April 18, 2014. | Manuscript published on April 30, 2014. | PP: 1-3  | Volume-3, Issue-4, April 2014. | Retrieval Number:  D2776043414/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Secure multiparty protocols is used as third party protocols in the data hiding and security. The major problem is, there is no Security Scheme operated for Data Storage Services between Multi Party protocols. To overcome this look-ahead approach, specifically for secure multiparty protocols to achieve distributed k-anonymity, which helps parties to decide if the utility benefit from the protocol is within an acceptable range before initiating the protocol. The look-ahead operation is highly localized and its accuracy depends on the amount of information. The system deals with Generalization approach, with a common Identification. Suppression approach, used for Hiding User Identity. In the secure random key algorithm, an Authentication Key is generated before a user change, update the data for Verification. Entire Data is encrypted to ensure Security.
Keywords: Security, Privacy, k-anonymity, Multi Party protocols.