SlideShare a Scribd company logo
Enforcing Secure and Privacy-Preserving Information Brokering in
Distributed Information Sharing
ABSTRACT:
Today’s organizations raise an increasing need for information sharing via on-demand access.
Information Brokering Systems (IBSs) have been proposed to connect large-scale loosely-
federated data sources via a brokering overlay, in which the brokers make routing decisions to
direct client queries to the requested data servers. Many existing IBSs assume that brokers are
trusted and thus only adopt server-side access control for data confidentiality. However, privacy
of data location and data consumer can still be inferred from metadata (such as query and access
control rules) exchanged within the IBS, but little attention has been put on its protection. In
this article, we propose a novel approach to preserve privacy of multiple stakeholders involved
in the information brokering process. We are among the first to formally define two privacy
attacks, namely attribute-correlation attack and inference attack, and propose two
countermeasure schemes automaton segmentation and query segment encryption to securely
share the routing decision making responsibility among a selected set brokering servers. With
comprehensive security analysis and experimental results, we show that our approach
seamlessly integrates security enforcement with query routing to provide system-wide security
with insignificant overhead.
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
EXISTING SYSTEM:
Most of the existing systems work on two extremes of the spectrum, adopting either the query-
answering model to establish pair-wise client-server connections for on-demand information
access, where peers are fully autonomous but there lacks system wide coordination, or the
distributed database model, where all peers with little autonomy are managed by a unified
DBMS.
DISADVANTAGES OF EXISTING SYSTEM:
Many existing IBSs assume that brokers are trusted and thus only adopt server-side access
control for data confidentiality. However, privacy of data location and data consumer can still
be inferred from metadata (such as query and access control rules) exchanged within the IBS,
but little attention has been put on its protection.
PROPOSED SYSTEM:
In this article, we present a general solution to the privacy preserving information sharing
problem. First, to address the need for privacy protection, we propose a novel IBS, namely
Privacy Preserving Information Brokering (PPIB). It is an overlay infrastructure consisting of
two types of brokering components, brokers and coordinators. The brokers, acting as mix
anonymizer, are mainly responsible for user authentication and query forwarding. The
coordinators, concatenated in a tree structure, enforce access control and query routing based on
the embedded non-deterministic finite automata – the query brokering automata. To prevent
curious or corrupted coordinators from inferring private information, we design two novel
schemes to segment the query brokering automata and encrypt corresponding query segments
so that routing decision making is decoupled into multiple correlated tasks for a set of
collaborative coordinators. while providing integrated innetwork access control and content-
based query routing, the proposed IBS also ensures that a curious or corrupted coordinator is
not capable to collect enough information to infer privacy, such as “which data is being
queried”, “where certain data is located”, or “what are the access control policies”, etc.
ADVANTAGES OF PROPOSED SYSTEM:
This work is the first to formally define two privacy attacks, namely attribute-correlation attack
and inference attack, and propose two countermeasure schemes automaton segmentation and
query segment encryption to securely share the routing decision making responsibility among a
selected set brokering servers.
ARCHITECTURE:
MODULES:
ALGORITHM USED:
The automaton segmentation algorithm
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
• Operating system : - Windows XP.
• Coding Language : ASP.NET, C#.Net.
• Data Base : SQL Server 2005
REFERENCE:
Fengjun Li, Bo Luo, Peng Liu Dongwon Lee and Chao-Hsien Chu, “Enforcing Secure and
Privacy-Preserving Information Brokering in Distributed Information Sharing”, IEEE
TRANSCATIONS ON INFORMATION FORENSICS AND SECURITY, 2013.

More Related Content

DOCX
Enforcing secure and privacy preserving information brokering in distributed ...
DOCX
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
PPTX
Shared aythority ppt design [autosaved]
DOC
Shared authority based privacy preserving authentication protocol in cloud co...
PDF
Shared authority based privacy preserving authentication protocol in cloud co...
PPT
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
PPTX
Cloud computing security
PPT
Shared authority based privacy preserving authentication protocol in cloud co...
Enforcing secure and privacy preserving information brokering in distributed ...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
Shared aythority ppt design [autosaved]
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Cloud computing security
Shared authority based privacy preserving authentication protocol in cloud co...

What's hot (17)

PDF
Cloud assisted mobile-access of health data with privacy and auditability
DOCX
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
DOCX
Cloud assisted mobile-access of health data with privacy and auditability
PDF
A cloud storage system for sharing data securely with privacy preservation an...
DOCX
A secure anti collusion data sharing scheme for dynamic groups in the cloud
PPTX
Dont look at this
PPTX
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
PDF
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
PPTX
secure multi-owner data sharing for dynamic groups
PDF
A secure anti collusion data sharing scheme for dynamic groups in the cloud
PDF
A provenance policy based access
DOC
Stayer cis 349 final exam guide set 2 new
PDF
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
PDF
Volume 2-issue-6-2073-2076
PDF
Shared authority based privacy preserving authentication protocol in cloud co...
PPT
Cloud assisted mobile-access of health data with privacy and auditability
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
Cloud assisted mobile-access of health data with privacy and auditability
A cloud storage system for sharing data securely with privacy preservation an...
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Dont look at this
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
secure multi-owner data sharing for dynamic groups
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A provenance policy based access
Stayer cis 349 final exam guide set 2 new
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
Volume 2-issue-6-2073-2076
Shared authority based privacy preserving authentication protocol in cloud co...
Ad

Viewers also liked (9)

DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Query adaptive image search with hash codes
DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Local directional number pattern for face analysis face and expression recogn...
DOCX
Reversible watermarking based on invariant image classification and dynamic h...
DOCX
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
DOCX
Reversible data hiding with optimal value transfer
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
DOCX
Hand Written Character Recognition Using Neural Networks
Scalable face image retrieval using attribute enhanced sparse codewords
Query adaptive image search with hash codes
Scalable face image retrieval using attribute enhanced sparse codewords
Local directional number pattern for face analysis face and expression recogn...
Reversible watermarking based on invariant image classification and dynamic h...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Reversible data hiding with optimal value transfer
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Hand Written Character Recognition Using Neural Networks
Ad

Similar to Enforcing secure and privacy preserving information brokering in distributed information sharing (20)

PPTX
PPTX
PPT
Ppt1 130410095050-phpapp01
PPT
Ppt1 130410095050-phpapp01
PPT
82ugszwcqn29itkwai2q 140424034504-phpapp01
PPT
Ppt1 130410095050-phpapp01
PPT
Ppt1 130410095050-phpapp01
PPT
82ugszwcqn29itkwai2q 140424034504-phpapp01
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01

More from IEEEFINALYEARPROJECTS (20)

DOCX
An access point based fec mechanism for video transmission over wireless la ns
DOCX
Towards differential query services in cost efficient clouds
DOCX
Spoc a secure and privacy preserving opportunistic computing framework for mo...
DOCX
Secure and efficient data transmission for cluster based wireless sensor netw...
DOCX
Privacy preserving back propagation neural network learning over arbitrarily ...
DOCX
Non cooperative location privacy
DOCX
Harnessing the cloud for securely outsourcing large
DOCX
Geo community-based broadcasting for data dissemination in mobile social netw...
DOCX
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
DOCX
Dynamic resource allocation using virtual machines for cloud computing enviro...
DOCX
A secure protocol for spontaneous wireless ad hoc networks creation
DOCX
Utility privacy tradeoff in databases an information-theoretic approach
DOCX
Two tales of privacy in online social networks
DOCX
Spatial approximate string search
DOCX
Sort a self organizing trust model for peer-to-peer systems
DOCX
Security analysis of a single sign on mechanism for distributed computer netw...
DOCX
Securing class initialization in java like languages
DOCX
Secure encounter based mobile social networks requirements, designs, and trad...
DOCX
Reversible data hiding in encrypted images by reserving room before encryption
DOCX
Privacy preserving data sharing with anonymous id assignment
An access point based fec mechanism for video transmission over wireless la ns
Towards differential query services in cost efficient clouds
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Secure and efficient data transmission for cluster based wireless sensor netw...
Privacy preserving back propagation neural network learning over arbitrarily ...
Non cooperative location privacy
Harnessing the cloud for securely outsourcing large
Geo community-based broadcasting for data dissemination in mobile social netw...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Dynamic resource allocation using virtual machines for cloud computing enviro...
A secure protocol for spontaneous wireless ad hoc networks creation
Utility privacy tradeoff in databases an information-theoretic approach
Two tales of privacy in online social networks
Spatial approximate string search
Sort a self organizing trust model for peer-to-peer systems
Security analysis of a single sign on mechanism for distributed computer netw...
Securing class initialization in java like languages
Secure encounter based mobile social networks requirements, designs, and trad...
Reversible data hiding in encrypted images by reserving room before encryption
Privacy preserving data sharing with anonymous id assignment

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Big Data Technologies - Introduction.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation theory and applications.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Approach and Philosophy of On baking technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Cloud computing and distributed systems.
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
Teaching material agriculture food technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Review of recent advances in non-invasive hemoglobin estimation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Big Data Technologies - Introduction.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation theory and applications.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Approach and Philosophy of On baking technology
Machine learning based COVID-19 study performance prediction
Network Security Unit 5.pdf for BCA BBA.
Empathic Computing: Creating Shared Understanding
Cloud computing and distributed systems.
Advanced methodologies resolving dimensionality complications for autism neur...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Programs and apps: productivity, graphics, security and other tools
Building Integrated photovoltaic BIPV_UPV.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Teaching material agriculture food technology
“AI and Expert System Decision Support & Business Intelligence Systems”

Enforcing secure and privacy preserving information brokering in distributed information sharing

  • 1. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing ABSTRACT: Today’s organizations raise an increasing need for information sharing via on-demand access. Information Brokering Systems (IBSs) have been proposed to connect large-scale loosely- federated data sources via a brokering overlay, in which the brokers make routing decisions to direct client queries to the requested data servers. Many existing IBSs assume that brokers are trusted and thus only adopt server-side access control for data confidentiality. However, privacy of data location and data consumer can still be inferred from metadata (such as query and access control rules) exchanged within the IBS, but little attention has been put on its protection. In this article, we propose a novel approach to preserve privacy of multiple stakeholders involved in the information brokering process. We are among the first to formally define two privacy attacks, namely attribute-correlation attack and inference attack, and propose two countermeasure schemes automaton segmentation and query segment encryption to securely share the routing decision making responsibility among a selected set brokering servers. With comprehensive security analysis and experimental results, we show that our approach seamlessly integrates security enforcement with query routing to provide system-wide security with insignificant overhead. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. EXISTING SYSTEM: Most of the existing systems work on two extremes of the spectrum, adopting either the query- answering model to establish pair-wise client-server connections for on-demand information access, where peers are fully autonomous but there lacks system wide coordination, or the distributed database model, where all peers with little autonomy are managed by a unified DBMS. DISADVANTAGES OF EXISTING SYSTEM: Many existing IBSs assume that brokers are trusted and thus only adopt server-side access control for data confidentiality. However, privacy of data location and data consumer can still be inferred from metadata (such as query and access control rules) exchanged within the IBS, but little attention has been put on its protection. PROPOSED SYSTEM: In this article, we present a general solution to the privacy preserving information sharing problem. First, to address the need for privacy protection, we propose a novel IBS, namely Privacy Preserving Information Brokering (PPIB). It is an overlay infrastructure consisting of two types of brokering components, brokers and coordinators. The brokers, acting as mix anonymizer, are mainly responsible for user authentication and query forwarding. The coordinators, concatenated in a tree structure, enforce access control and query routing based on the embedded non-deterministic finite automata – the query brokering automata. To prevent curious or corrupted coordinators from inferring private information, we design two novel schemes to segment the query brokering automata and encrypt corresponding query segments so that routing decision making is decoupled into multiple correlated tasks for a set of collaborative coordinators. while providing integrated innetwork access control and content- based query routing, the proposed IBS also ensures that a curious or corrupted coordinator is not capable to collect enough information to infer privacy, such as “which data is being queried”, “where certain data is located”, or “what are the access control policies”, etc.
  • 3. ADVANTAGES OF PROPOSED SYSTEM: This work is the first to formally define two privacy attacks, namely attribute-correlation attack and inference attack, and propose two countermeasure schemes automaton segmentation and query segment encryption to securely share the routing decision making responsibility among a selected set brokering servers. ARCHITECTURE:
  • 4. MODULES: ALGORITHM USED: The automaton segmentation algorithm SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. SOFTWARE REQUIREMENTS:
  • 5. • Operating system : - Windows XP. • Coding Language : ASP.NET, C#.Net. • Data Base : SQL Server 2005 REFERENCE: Fengjun Li, Bo Luo, Peng Liu Dongwon Lee and Chao-Hsien Chu, “Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing”, IEEE TRANSCATIONS ON INFORMATION FORENSICS AND SECURITY, 2013.