Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Query Profile Obfuscation for Secure Transaction


Affiliations
1 V.R.S. College of Engineering and Technology, Villupuram, India
2 CSE, V.R.S. College of Engineering and Technology, Villupuram, India
     

   Subscribe/Renew Journal


This project focus on secure query exchange between multiple system. So that, intermediate systems couldn't predict the search categories preferred by the source point. In the proposed approach, we have initiated the methodology of enabling mutual privacy gain by enhancing their privacy protection through collaboration in query exchanges. To this end, our approach starts with a mathematical formulation, involving the modeling of the users' apparent profiles as probability distributions over categories of interest, and the measure of their privacy as the corresponding Shannon entropy. The question of which query categories to exchange translates into finding optimization variables representing exchange policies, for various optimization objectives based on those entropies, possibly under exchange traffic constraints.

Keywords

Query Exchange, Obfuscation, Shannon Entropy, Optimization Techniques.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 244

PDF Views: 3




  • Query Profile Obfuscation for Secure Transaction

Abstract Views: 244  |  PDF Views: 3

Authors

R. Vijayalakshmi
V.R.S. College of Engineering and Technology, Villupuram, India
A. Shamaladevi
CSE, V.R.S. College of Engineering and Technology, Villupuram, India
N. Vidhya
CSE, V.R.S. College of Engineering and Technology, Villupuram, India

Abstract


This project focus on secure query exchange between multiple system. So that, intermediate systems couldn't predict the search categories preferred by the source point. In the proposed approach, we have initiated the methodology of enabling mutual privacy gain by enhancing their privacy protection through collaboration in query exchanges. To this end, our approach starts with a mathematical formulation, involving the modeling of the users' apparent profiles as probability distributions over categories of interest, and the measure of their privacy as the corresponding Shannon entropy. The question of which query categories to exchange translates into finding optimization variables representing exchange policies, for various optimization objectives based on those entropies, possibly under exchange traffic constraints.

Keywords


Query Exchange, Obfuscation, Shannon Entropy, Optimization Techniques.