Main Reference PaperA Look-Ahead Approach to Secure Multiparty Protocols IEEE Transactions ON Knowledge and Data Engineering, July 2012.
  • The main focus of this paper is to design the look ahead approach for SMC protocol with the help of distributed k-anonymity technique which is a well-known privacy preservation technique to prevent linking attacks on shared databases. It is used to decide whether the utility benefit from the protocol is within an acceptable range before initiating the protocol.

+ Description
  • The main focus of this paper is to design the look ahead approach for SMC protocol with the help of distributed k-anonymity technique which is a well-known privacy preservation technique to prevent linking attacks on shared databases. It is used to decide whether the utility benefit from the protocol is within an acceptable range before initiating the protocol.

  • To design the look-ahead protocol for SMC protocol specifically using the distributed k-anonymity to prevent linking attacks on shared databases.

  • To design the efficient look ahead protocol that achieves high localized fast computation with little communication and computation cost.

+ Aim & Objectives
  • To design the look-ahead protocol for SMC protocol specifically using the distributed k-anonymity to prevent linking attacks on shared databases.

  • To design the efficient look ahead protocol that achieves high localized fast computation with little communication and computation cost.

  • K-anonymity does not guarantee privacy against attackers using background knowledge. To overcome this problem, a novel and powerful privacy definition called ℓ-diversity is contributed. ℓ-diversity contains minimum ℓ-diverse sensitive attributes in each partitioned table of horizontally partitioned data

+ Contribution
  • K-anonymity does not guarantee privacy against attackers using background knowledge. To overcome this problem, a novel and powerful privacy definition called ℓ-diversity is contributed. ℓ-diversity contains minimum ℓ-diverse sensitive attributes in each partitioned table of horizontally partitioned data

  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.