Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  An Efficient Model for Secure Data Publishing  
  Authors : Gaurav Kumar Ameta; Divya Bhatnagar
  Cite as:

 

Data Mining is the field of extracting and analyzing the data from large datasets. Exchange of databases is very important to get financial benefits now a day. To review business strategies and to get maximum benefit data analytics is needed. Data stored at distributed sites are integrated and published by data publisher. Data Publishing is the technique in which the data is released to others for the use. In addition to privacy preserving data size and security is also a challenge while publishing and transmitting the database. So there is a requirement of a technique which can reduce the size of database efficiently and transfer it in a secure manner. This paper proposes an efficient model for secure data publishing by using both compression and color encryption thus introducing a new approach. A new algorithm is designed and a tool is developed for implementing the proposed work.

 

Published In : IJCSN Journal Volume 5, Issue 2

Date of Publication : April 2016

Pages : --

Figures :06

Tables : 02

Publication Link : An Efficient Model for Secure Data Publishing

 

 

 

Gaurav Kumar Ameta : is a Research Scholar, Department of Computer Science and Engineering at Sir Padampat Singhania University, Udaipur, India. His area of specialization is Data Mining, Computer Graphics, Cryptography, and Privacy Preservation.

Divya Bhatnagar : is working as Professor in the department of Computer Science and Engineering in School of Engineering, Sir Padampat Singhania University, Udaipur, India. She holds 18 years of teaching and research experience. Her specialization areas include data mining and Neural Networks.

 

 

 

 

 

 

 

Data Publishing, Data Mining. Distributed Databases, Tool for Data Publishing

In this paper a Tool was developed to encrypt the transactional databases. Technique used is efficient because the database is compressed to another encrypted form with compression but without losing the accuracy of database. Accuracy, security and size of database are major concerns while publishing the data. Secure data publishing is achieved without any loss of accuracy. The information of Hex Code matrix is compressed in such a manner that it becomes more compressed and secure. Such a technique is beneficial when the size of database is very large. In future, few more security levels can be added. Overheads and related challenges are to be discussed in detail as an extension to the proposed work.

 

 

 

 

 

 

 

 

 

[1] Pinkas B. “Cryptographic Journal of Information and Education Technology, Vol. 1, 2011, 137-141. [2] B. Maram, “Unicode and Colors Integration Tool for Encryption and Decryption”, International Journal of Computer Science and Engineering, Vol. 3, 2011, 1197-1202. [3] K. Q. Aphtesi, “A Visual Cryptographic Encryption Technique for Securing Medical Images”, International Journal of Emerging Technology and Advanced Engineering, Vol. 3, 2013, 496-500. [4] Panchami V, Paul V. and Wahi A, “A New Color Oriented Cryptographic Algorithm based Unicode and RGB Color model”. International Journal of Research in Engineering and Technology, Vol. 3, 2014, 82-87. [5] Palanisamy V. and Shanthi, “A Novel Text to Image Encryption Technique by AES Rijndael Algorithm with Color Code Conversion”, International Journal of Engineering Trends and Technology, Vol. 13, 2014. [6] Y. L. Lee and W.H. Tsai, “A New Secure Image Transmission Technique via Secret- Fragment-Mosaic Images by Nearly Reversible Color Transformations”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 24, 2014, 695-703. [7] Rajesh N, S Sushmashree, V Varshini, NB Bhavani and D Pradeep, “Color Code Based Authentication and Encryption”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4 , 2015, 403-405. [8] O.M. Sabeena and R.P. Haroon, “ Reversible Data Hiding in Encrypted Color Images by Reversing Room before Encryption with LSB Method”, International Journal of Computational Engineering Research, Vol. 4, 2014, 68-72. [9] S. Yuanyuan, X. Rudan, L. Chen and X. Hu,“ Image Compression and Encryption Scheme using fractal dictionary and Julia set”, IET Digital Library, Vol. 9, 2015, 173-183. [10] M.M. Laham, “Encryption-Decryption RGB Color Image Using Matrix Multiplication”, International Journal of Computer Science & Information Technology, Vol. 7, 2015, 109-119. [11] R.D. Yalene, N.N. Mhala and B.J. Chilke, “Security Approach by Using Visual Cryptography Technique”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.5, 2015, 192-195. [12] M. Karolin and T. Mayappan, “RGB Based Secret Sharing Scheme in Color Visual Cryptography”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, 2015, 151-155. [13]A.M. Sharadqah, “RGB Color Image Encryption-Decryption Using Gray Image”, International Journal Techniques for Privacy Preserving Data Mining “SIGKDD Explorations 2002, Vol. No. 4, 2002, 12-19. [14] K Sakthidasan and B.V.S. Krishna, “A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images”, International Journal of Computer Science Issues”, Vol. 12, 2015, 137-139. [15] A.G. Gokul and N. Kumaratharan, “A Secure and Verifiable Visual Cryptography for Color Images”, Universal Journal of Electrical and Electronic Engineering, Vol. 3, 2015, 165-172.