An efficient model for secure data publishing

Ameta, Gaurav Kumar and Bhatnagar, Divya An efficient model for secure data publishing. International Journal of Computer Science and Network - IJCSN, 2016, vol. 5, n. 2. [Journal article (Unpaginated)]

[thumbnail of An-Efficient-Model-for-Secure-Data-Publishing.pdf] Text
An-Efficient-Model-for-Secure-Data-Publishing.pdf - Published version

Download (151kB)

English abstract

Data Mining is the field of extracting and analyzing the data from large datasets. Exchange of databases is very important to get financial benefits now a day. To review business strategies and to get maximum benefit data analytics is needed. Data stored at distributed sites are integrated and published by data publisher. Data Publishing is the technique in which the data is released to others for the use. In addition to privacy preserving data size and security is also a challenge while publishing and transmitting the database. So there is a requirement of a technique which can reduce the size of database efficiently and transfer it in a secure manner. This paper proposes an efficient model for secure data publishing by using both compression and color encryption thus introducing a new approach. A new algorithm is designed and a tool is developed for implementing the proposed work.

Item type: Journal article (Unpaginated)
Keywords: Data Publishing; Data Mining; Distributed Databases; Tool for Data Publishing
Subjects: L. Information technology and library technology > LN. Data base management systems.
Depositing user: IJCSN Journal
Date deposited: 27 Oct 2016 14:04
Last modified: 27 Oct 2016 14:04
URI: http://hdl.handle.net/10760/29888

References

[1] Pinkas B. “Cryptographic Journal of Information and Education Technology, Vol. 1, 2011, 137-141. [2] B. Maram, “Unicode and Colors Integration Tool for Encryption and Decryption”, International Journal of Computer Science and Engineering, Vol. 3, 2011, 1197-1202. [3] K. Q. Aphtesi, “A Visual Cryptographic Encryption Technique for Securing Medical Images”, International Journal of Emerging Technology and Advanced Engineering, Vol. 3, 2013, 496-500. [4] Panchami V, Paul V. and Wahi A, “A New Color Oriented Cryptographic Algorithm based Unicode and RGB Color model”. International Journal of Research in Engineering and Technology, Vol. 3, 2014, 82-87. [5] Palanisamy V. and Shanthi, “A Novel Text to Image Encryption Technique by AES Rijndael Algorithm with Color Code Conversion”, International Journal of Engineering Trends and Technology, Vol. 13, 2014. [6] Y. L. Lee and W.H. Tsai, “A New Secure Image Transmission Technique via Secret- Fragment-Mosaic Images by Nearly Reversible Color Transformations”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 24, 2014, 695-703. [7] Rajesh N, S Sushmashree, V Varshini, NB Bhavani and D Pradeep, “Color Code Based Authentication and Encryption”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4 , 2015, 403-405. [8] O.M. Sabeena and R.P. Haroon, “ Reversible Data Hiding in Encrypted Color Images by Reversing Room before Encryption with LSB Method”, International Journal of Computational Engineering Research, Vol. 4, 2014, 68-72. [9] S. Yuanyuan, X. Rudan, L. Chen and X. Hu,“ Image Compression and Encryption Scheme using fractal dictionary and Julia set”, IET Digital Library, Vol. 9, 2015, 173-183. [10] M.M. Laham, “Encryption-Decryption RGB Color Image Using Matrix Multiplication”, International Journal of Computer Science & Information Technology, Vol. 7, 2015, 109-119. [11] R.D. Yalene, N.N. Mhala and B.J. Chilke, “Security Approach by Using Visual Cryptography Technique”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.5, 2015, 192-195. [12] M. Karolin and T. Mayappan, “RGB Based Secret Sharing Scheme in Color Visual Cryptography”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, 2015, 151-155. [13]A.M. Sharadqah, “RGB Color Image Encryption-Decryption Using Gray Image”, International Journal Techniques for Privacy Preserving Data Mining “SIGKDD Explorations 2002, Vol. No. 4, 2002, 12-19. [14] K Sakthidasan and B.V.S. Krishna, “A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images”, International Journal of Computer Science Issues”, Vol. 12, 2015, 137-139. [15] A.G. Gokul and N. Kumaratharan, “A Secure and Verifiable Visual Cryptography for Color Images”, Universal Journal of Electrical and Electronic Engineering, Vol. 3, 2015, 165-172.


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item