Emendation of undesirable attack on multiparty data sharing with anonymous id assignment
-
Upload
rene-thomas -
Category
Technology
-
view
83 -
download
1
Transcript of Emendation of undesirable attack on multiparty data sharing with anonymous id assignment
EMENDATION OF UNDESIRABLE ATTACK ON MULTIPARTY DATA
SHARING USING AIDA ALGORITHM
Presented By
RENE THOMAS
04/15/2023 Dept. of CSE 1
CONTENTS• OBJECTIVE
• EXISTING SYSTEM
• DRAWBACKS
• PROPOSED SYSTEM
• ADVANTAGES
• MODULES USED
• TABLES USED
• DATAFLOW DIAGRAMS
• SCREENSHOTS
04/15/2023 Dept. of CSE 2
OBJECTIVES
04/15/2023 Dept. of CSE 3
Mainly deals with how we can secure multiparty data sharing with fast and
easy implementation.
In order to have complex data sharing we can use AIDA so that the
computation will be effective than the existed one.
Sharing data between sender and receiver without any conflicts.
Anonymously sharing simple data and results in methods for efficient sharing
of complex data. This can be done with AIDA.
EXISTING SYSTEM
• The privacy preserving data sharing with anonymous id assignment uses
a secure sum algorithm
• Secure sum allows parties to compute sum of their individual inputs
without disclosing the inputs to one another.
• This system is only for the authority and the dominant personalities.
• There is no interaction between the user and the admin and other
respected persons participated through any media.
• Mainly the relevance of the existing system is used in patient medical
records, electronic voting, e-mail, social networking etc. 04/15/2023 Dept. of CSE 4
DRAWBACKS OF EXISTING SYSTEM
• The existing systems another person to easily access database.
• The algorithms for mental poker are more complex and utilize cryptographic methods as players.
• Lack of immediate retrievals.
• Lack of immediate information storage
• Lack of prompt updating
• Considering participants are either semi-honest, passive or honest-but-curious and execute their required protocol faithfully.
• Redundancy of records may occur.
• Data verification and validity are done manually.
04/15/2023 Dept. of CSE 5
PROPOSED SYSTEM
• This work deals with the efficient algorithms for assigning identifiers (ID’s) to the nodes of a network in such a way that the id’s are anonymous using a distributed computation with no central authority.
• Given N nodes, this assignment is essentially a permutation of the integers
{ 1… N} with each id being known only to the node to which it is assigned.
• Anonymously sharing simple data and results in methods for efficient sharing of complex data. This can be done with AIDA.
• The methods developed in these works generally require a trusted administrator and their end products differ from and/or in statistical properties.
04/15/2023 Dept. of CSE 6
ADVANTAGES• Reduce time consumption
• Increasing a parameter in the algorithm reduce no of expected rounds.
• Modules are properly arranged.
• The anonymity of database not affecting the records.
• Avoids unauthorized access on data
• More efficient
• Error detection.
• Redundancy can be avoided.
• Increased user satisfaction
• Highly reliable and flexible
• Easy data retrieval04/15/2023 Dept. of CSE 7
MODULES USED
In this project, there exists various modules:
• Encrypt
• Decrypt
• Authentication
• Admin
• Users
04/15/2023 Dept. of CSE 8
1. Encrypt
In encrypt module the user can encrypt the plain-text into cypher-text.
• Generate id
• Generate key
• Show id
2. Decrypt
Since the message is in cypher-text, the decrypt module used to decrypt the
message from encrypted format.
• Decrypt message
04/15/2023 Dept. of CSE 9
3. Authentication
In authentication module mainly the authentication of user
can be done.
Login
Success message
Unsuccessful message
04/15/2023 Dept. of CSE 10
4. User
• The user module is one of the important module in this system.
• The data transfer can be done across different users.
• User login to the system has four different modules.
Modules in user:View Acknowledgment.View keyReceive dataSend message
04/15/2023 Dept. of CSE 11
5. Admin
Admin can view all the details in the system. He is the one who add the employees according to their designations. He has mainly four modules and each of it have different properties.
• Add Employee
• Send Acknowledgment
• Send data
• Generate id
• Data Encryption
04/15/2023 Dept. of CSE 12
CONCLUSION
•AIDA rule is the main thing in allocating ID to users
•Even under difficult situations the communications and bandwidth is not affected in any manner.
•AIDA proves to be secure for distributed architecture keeping the user safe from prying persons under attack in different segments.
•In future the scheme may be extended as a web service.
•Mobile web services are an area of interest for future extensions to AIDA.
04/15/2023 Dept. of CSE 29
REFERENCE• A. Friedman, R. Wolff, and A. Schuster, “Providing k-anonymity in data mining,” VLDB Journal, vol. 17, no.
4, pp. 789–804, Jul. 2008.
• F. Baiardi, A. Falleni, R. Granchi, F. Martinelli, M. Petrocchi, and A. Vaccarelli, “Seas, a secure e-voting protocol: Design and implementation,” Comput. Security, vol. 24, no. 8, pp. 642–652, Nov. 2005.
• D. Chaum, “Untraceable electronic mail, return address and digital pseudonyms,” Commun. ACM, vol. 24, no. 2, pp. 84–88, Feb. 1981.
• Q. Xie and U. Hengartner, “Privacy-preserving matchmaking for mobile social networking secure against malicious users,” in Proc. 9th Ann. IEEE Conf. Privacy, Security and Trust, Jul. 2011, pp. 252–259.
• J. Smith, “Distributing identity [symmetry breaking distributed access protocols],” IEEE Robot. Autom. Mag., vol. 6, no. 1, pp. 49–56, Mar. 1999
• Larry A. Dunning, Member, IEEE, and Ray Kresman “Privacy Preserving Data Sharing With Anonymous ID Assignment” in IEEE transaction on information and forensics and security, vol 8, no. 2 february 2013
• Benjamin C.M. Fung, Member, IEEE, Thomas Trojer, Member, IEEE, Patrick C.K. Hung, Member, IEEE, Li Xiong, Member, IEEE,
• Khalil Al-Hussaeni, Member, IEEE, and Rachida Dssouli, Member, IEEE, “Service-Oriented Architecture for High-Dimensional Private Data Mashup” IEEE transactions on services computing,vol. 5, no. 3,july-september 2012
04/15/2023 Dept. of CSE 30