We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Tool for Protecting Electronic Data in Centralized database using Improved Advance Encryption Standard (AES) and Secure Hash Algorithm (SHA)

by Amrita Malviya, Roopam Gupta, Sanjeev Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 120 - Number 2
Year of Publication: 2015
Authors: Amrita Malviya, Roopam Gupta, Sanjeev Sharma
10.5120/21200-3868

Amrita Malviya, Roopam Gupta, Sanjeev Sharma . A Tool for Protecting Electronic Data in Centralized database using Improved Advance Encryption Standard (AES) and Secure Hash Algorithm (SHA). International Journal of Computer Applications. 120, 2 ( June 2015), 19-24. DOI=10.5120/21200-3868

@article{ 10.5120/21200-3868,
author = { Amrita Malviya, Roopam Gupta, Sanjeev Sharma },
title = { A Tool for Protecting Electronic Data in Centralized database using Improved Advance Encryption Standard (AES) and Secure Hash Algorithm (SHA) },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 120 },
number = { 2 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 19-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume120/number2/21200-3868/ },
doi = { 10.5120/21200-3868 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:05:11.986357+05:30
%A Amrita Malviya
%A Roopam Gupta
%A Sanjeev Sharma
%T A Tool for Protecting Electronic Data in Centralized database using Improved Advance Encryption Standard (AES) and Secure Hash Algorithm (SHA)
%J International Journal of Computer Applications
%@ 0975-8887
%V 120
%N 2
%P 19-24
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, there is a wide amount of data available; which can be any one's personal data or any organization's important data. The main problem is to hide sensitive information, which include personal information, fact or even pattern which is generated by any data mining algorithm. Hence the desire to keep our own sensitive data secret in multiparty storage system is an important challenge of privacy preserving. The traditional privacy protection methods cannot do well, facing an urgent need for privacy protection in data mining, when they protect sensitive data. This paper propose a technique that protect electronic data in centralized database using Improved Advance Encryption Standard(AES) and Secure Hash Algorithm (SHA) This method is suitable for any type of data like- text, image and video.

References
  1. Xinjun Qi, Mingkui Zong, "An Overview of Privacy Preserving Data Mining", SciVerse ScienceDirect, Procdia Environmental Science 12(2012) 1341-1347, ICESE(2011).
  2. Archana Tomar, Vineet Richhariya, and Mahendra Ku. Mishra, "A Improve Privacy Preserving Algorithm using Association Rule Mining In Centralized Database", ISSN No. :2250-3536, IJATER(2012).
  3. Raluca Ada Popa, Frank H. Li and Nickolai Zeldovich, "An Ideal-Security Protocol for Order-Preserving Encoding", 2013 IEEE Symposium on Security and Privacy.
  4. Nirali Nanavati and Devesh Jinwala " Privacy Preservation for Global Cyclic Associations in Distributed Database", SciVerse ScienceDirect, procedia Technology 6(2012) 962-969, 2nd (ICCCS-2012).
  5. Larry A. Dunning and Ray Kresman "Privacy Preserving Data Sharing With Anonymous ID Assingnment", IEEE Transactions on Information Forensics and Security, 1556-6013, 2013.
  6. Mafruz Zaman Ashrafi, David Taniar and Kate Smith "ODAM: An Optimized Distribution Association rule Mining Algorithm", IEEE Distributed System Online 1541-4922, 2004.
  7. Geetha Mary A and N. Ch. S. N. Iyengar"Non-Additive Random Data Perturbation for Real World Data", SciVersa Sciencedirect, procedia Technology 4(2012)350-354.
  8. K. Srinivasa Rao and B. Srinivasa Rao"An Insight in to Privacy Preserving Data Mining Methods",SIJ Transactions on CSEA,No. 3 july-august2013.
  9. Purushotham B. R. and B. B. Amberker"Duplication with Trapdoor Sensitive Attribute Values:A New Approach for Privacy Preserving Data Publishing", SciVersa Sciencedirect, procedia Technology 6(2012) 970-977.
  10. E. C. Laskari, E. C. Meletiou, D. K. Tasoulis, and M. N. Vrahatis"Privacy Preserving Electronic Data Gathering", Sciencedirect Mathematical and Computer Modelling 42(2005) 739-746.
  11. Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu and Jeremy K. -P. Chen"Value versus Damage of Information Release: A Data Privacy Perspective", Sciencedirect International Journal of Approximate Reasoning 43(2006) 179-201
  12. Salim M. Wadi and Nashruddin Zainal "Rapid Encryption Method Based on AES algorithmfor GGrey Scale HD Image Encryption", ScienceDirect11(2013)51-56
Index Terms

Computer Science
Information Sciences

Keywords

Protecting privacy: data mining: sensitive data.