Open Access Open Access  Restricted Access Subscription or Fee Access

Query Profile Obfuscation for Secure Transaction

R. Vijayalakshmi, A. Shamaladevi, N. Vidhya

Abstract


 

This project focus on secure query exchange between multiple system. So that, intermediate systems couldn’t predict the search categories preferred by the source point. In the proposed approach, we have initiated the methodology of enabling mutual privacy gain by enhancing their privacy protection through collaboration in query exchanges. To this end, our approach starts with a mathematical formulation, involving the modeling of the users’ apparent profiles as probability distributions over categories of interest, and the measure of their privacy as the corresponding Shannon entropy. The question of which query categories to exchange translates into finding optimization variables representing exchange policies, for various optimization objectives based on those entropies, possibly under exchange traffic constraints.


Keywords


Query Exchange, Obfuscation, Shannon Entropy, Optimization Techniques

Full Text:

PDF

References


S.A. Weil, S.A. Brandt, E.L. Miller, D.D.E. Long, and C. Maltzahn,―Ceph: A Scalable, High-Performance Distributed File System,‖Proc. Symp. Operating Systems Design and Implementation (OSDI),2006.

Y. Hua, Y. Zhu, H. Jiang, D. Feng, and L. Tian, ―Supporting Scalable and Adaptive Metadata Management in Ultralarge-Scale File Systems,‖ IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 4, pp. 580-593, Apr. 2011.

M. Stonebraker and U. Cetintemel, ―One Size Fits All: An Idea Whose Time Has Come and Gone,‖ Proc. Int’l Conf. Data Eng. (ICDE), 2005.

A.W. Leung, M. Shao, T. Bisson, S. Pasupathy, and E.L. Miller, ―Spyglass: Fast, Scalable Metadata Search for Large-Scale Storage Systems,‖ Proc. Conf. File and Storage Technologies (FAST), 2009.

D. Roselli, J. Lorch, and T. Anderson, ―A Comparison of File System Workloads,‖ Proc. USENIX Conf., pp. 41-54, 2000.

M. Seltzer and N. Murphy, ―Hierarchical File Systems Are Dead,‖ Proc. Conf. Hot Topics in Operating Systems (HotOS), 2009.

D.K. Gifford, P. Jouvelot, M.A. Sheldon, and J.W. OToole, ―Semantic File Systems,‖ Proc. ACM Symp. Operating Systems Principles (SO SP), 1991.

N. Chatterjee, A. Potluri, and A. Negi, ―A scalable and adaptive clustering scheme for MANETs,‖ in Proc. Int. Conf. Distrib. Comput., Internet Technol. (ICDCIT), ser. Lecture Notes Comput. Sci. (LNCS), vol. 4882. Bangalore, India: Springer-Verlag, Dec. 2007, pp. 73–78.

D. Chaum, ―Untraceable electronic mail, return addresses, anddigital pseudonyms,‖ Commun. ACM, vol. 24, no. 2, pp. 84–88, 1981.

B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, ―Privateinformation retrieval,‖ in Proc. IEEE Annual Symp. Found. Comput. Sci. (FOCS), Milwaukee, WI, 1995, pp. 41–50.

T. M. Cover and J. A. Thomas, Elements of Information Theory, 2nd ed. New York: Wiley, 2006.

C. Cramer, O. Stanze, K. Weniger, and M. Zitterbart, ―Demanddriven clustering in MANETs,‖ in Proc. Int. Conf. Wirel. Netw. (ICWN), vol. 1, Las Vegas, NV, Jun. 2004, pp. 81–87.

G. Danezis, R. Dingledine, and N. Mathewson, ―Mixminion: Design of a type III anonymous remailer protocol,‖ in Proc. IEEESymp. Secur., Priv. (SP), Berkeley, CA, May 2003, pp. 2–15.

C. D´ıaz, ―Anonymity and privacy in electronic services,‖ Ph.D. dissertation, Katholieke Univ. Leuven, Dec. 2005.

R. Dingledine, ―Free Haven’s anonymity bibliography,‖ 2009. [Online]. Available: www.freehaven.net/anonbib/

J. Domingo-Ferrer, ―Coprivacy: Towards a theory of sustainable privacy,‖ in Priv. Stat. Databases (PSD), ser. Lecture Notes Comput.

Sci. (LNCS), vol. 6344. Corfu, Greece: Springer-Verlag, Sep. 2010, pp. 258–268.

——, ―Coprivacy: An introduction to the theory and applications of co-operative privacy,‖ Stat., Oper. Res. Trans. (SORT), Special Issue Priv. Stat. Databases, vol. 35, pp. 25–40, 2011.

J. Domingo-Ferrer, M. Bras-Amor´ os, Q. Wu, and J. Manj´on, ―Userprivate information retrieval based on a peer-to-peer community,‖ Data, Knowl. Eng., vol. 68, no. 11, pp. 1237–1252, 2009.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.