You are on page 1of 5

Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information

ABSTRACT To facilitate extensive collaborations, todays organizations raise increasing needs for information sharing via on-demand information access. Information Brokering System (IBS ato! a !eer-to-!eer overlay has been !ro!osed to s"!!ort information sharing among loosely federated data so"rces. It consists of diverse data servers and brokering com!onents, #hich hel! client $"eries to locate the data servers. %o#ever, many existing IBSs ado!t server side access control de!loyment and honest ass"m!tions on brokers, and shed little attention on !rivacy of data and metadata stored and exchanged #ithin the IBS. In this article, #e st"dy the !roblem of !rivacy !rotection in information brokering !rocess. &e first give a formal !resentation of the threat models #ith a foc"s on t#o attacks' attrib"te-correlation attack and inference attack. Then, #e !ro!ose a broker-coordinator overlay, aa #ell as t#o schemes, a"tomaton segmentation scheme and $"ery segment encry!tion scheme, to share the sec"re $"ery ro"ting f"nction among a set of brokering servers. &ith com!rehensive analysis on !rivacy, endto- end !erformance, and scalability, #e sho# that the !ro!osed system can integrate sec"rity enforcement and $"ery ro"ting #hile !reserving system-#ide !rivacy #ith reasonable overhead.

Contact: 040-40274843, 9703109334 Email id: academicliveprojects@gmail.com !!!.logicsystems.org.in

Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information

ARCHITECTURE

EXISTING SYSTEM: The existing system s"!!oses (lice o#ns a k-anonymo"s database and needs to determine #hether her database, #hen inserted #ith a t"!le o#ned by Bob, is still k-anonymo"s. (lso, s"!!ose that access to the database is strictly controlled, beca"se data are "sed for certain ex!eriments that need to be maintained confidential. )learly, allo#ing (lice to directly read the contents of the t"!le breaks the !rivacy of Bob* on the other hand, the confidentiality of the database managed by (lice is violated once Bob has access to the contents of the database. Th"s, the !roblem is to check #hether the database inserted #ith the t"!le is still k-anonymo"s, #itho"t letting (lice and Bob kno# the contents of the t"!le and the database res!ectively. Disadvantage: +. The database #ith the t"!le data does not be maintained confidentially. ,. The existing systems another !erson to easily access database.

Contact: 040-40274843, 9703109334 Email id: academicliveprojects@gmail.com !!!.logicsystems.org.in

Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information

PROPOSED SYSTEM: In the c"rrent !a!er, #e !resent t#o efficient !rotocols, one of #hich also s"!!orts the !rivate "!date of a generalization-based anonymo"s database. &e also !rovide sec"rity !roofs and ex!erimental res"lts for both !rotocols. So far no ex!erimental res"lts had been re!orted concerning s"ch ty!e of !rotocols* o"r res"lts sho# that both !rotocols !erform very efficiently. Advantage: +. The anonymity of -B is not affected by inserting the records. ,. &e !rovide sec"rity !roofs and ex!erimental res"lts for both !rotocols. MODULES +. )o-.rdinator /od"le. ,. Broker /od"le. 0. 1ser /od"le. 2. (dmin /od"le.

Co-Ordinator Modul : In this mod"le, the co-coordinator !erforms the global service bet#een the t#o end "sers. Initially the -ata .#ner needs to s"bmit the details of the !atient in the server. -ata 1sers needs to search the data #hich is stored in the servers and they give re$"est for the data and the co-.rdinator sends the key to the -ata "sers and the -ata #ill be !assed by the broker &ay.

Contact: 040-40274843, 9703109334 Email id: academicliveprojects@gmail.com !!!.logicsystems.org.in

Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information

Bro! r Modul : In this mod"le, the broker !erforms the role #ho can act bet#een the )o-coordinator and the data 1sers. The re$"est #hich are all s"bmitted from the data "ser #ill be verified and th"s it #ill be !assed to the co-coordinator. The data #ill be !assed from the co-coordinator and th"s it #ill be s"bmitted to the 3nd 1sers(-ata 1sers . U" r Modul : In this mod"le, the 1sers are classified into t#o ty!es they are, -ata 1sers and -ata .#ner -e!ends on the restriction the data #ill be !assed to the )o-coordinator. The co-coordinator !ass the details via broker and the data #ill be checked #ith the secret key and th"s it #ill dis!lay for the "sers. Ad#in Modul : In this mod"le, to arrange the database based on the !atient and doctor details and records. The admin needs to register and register the .rganization and 1sers 4orms.

S$"t # R %uir # nt S& 'i(i'ation: Hard)ar R %uir # nt": 5 5 5 5 5 5 5 System %ard -isk /onitor /o"se :am <eyboard ' 6enti"m I7 ,.2 8%z. ' 29 8B. ' +2 )olo"r /onitor. ' .!tical /o"se. ' ;+, /b. ' +9+ <eyboard.

4lo!!y -rive ' +.22 /b.

Contact: 040-40274843, 9703109334 Email id: academicliveprojects@gmail.com !!!.logicsystems.org.in

Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information

So(t)ar R %uir # nt": 5 5 5 .!erating system )oding >ang"age -ata Base ' &indo#s = 1ltimate. (0,-bit os ' ?(7( ' /@ SA>

Contact: 040-40274843, 9703109334 Email id: academicliveprojects@gmail.com !!!.logicsystems.org.in