Contact at or 8097636691
Responsive Ads Here

Friday, 23 February 2018

Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach (2013)

Utility-Privacy Tradeoff in Databases: 

An Information-theoretic Approach (2013)

Ensuring the usefulness of electronic data sources while  providing necessary privacy guarantees is an important unsolved problem. This problem drives the need for an analytical framework that can quantify
the  privacy of personally identifiable information while still providing a quantifable benefit (utility) to multiple legitimate information consumers. This paper presents an information-theoretic framework that promises an analytical model guaranteeing tight bounds of how much utility is possible for a given level of privacy and vice-versa. Specific contributions include: i) stochastic data models for both categorical and numerical data; ii) utility-privacy tradeoff regions and the encoding (sanization) schemes achieving them for both classes and their practical relevance; and iii) modeling of prior knowledge at the user and/or data source and optimal encoding schemes for both cases.
                                                  EXISTING SYSTEM
We divide the existing work into two categories, heuristic and theoretical techniques, and outline the major milestones from these categories for comparison. The earliest attempts at systematic privacy were in the area of census data publication where data was required to be made public but without leaking individuals’ information. A number of ad hoc techniques such as sub-sampling, aggregation, and suppression were explored. The first formal definition of privacy was k-anonymity by Sweeney. However k-anonymity was found to be inadequate as it only protects from identity disclosure but not attribute-based disclosure and was extended with t-closeness   and l-diversity  . All these techniques have proved to be non-universal as they were only robust against limited adversaries. Heuristic techniques for privacy in data mining have focused on using a mutual information-based privacy metrics.
                                                PROPOSED SYSTEM
Our work is based on the observation that large datasets (including databases) have a distributional basis; i.e., there exists an underlying (sometimes implicit) statistical model for the data. Even in the case
Of data mining where only one or a few instances of the dataset are ever available, the use of correlations between attributes used an implicit distributional assumption about the dataset. We explicitly model the data as being generated by a source with a finite or infinite alphabet and a known distribution. Each row of the database is a collection of correlated attributes (of an individual) that belongs to the alphabet of the source and is generated according to the probability of occurrence of that letter (of the alphabet). Our statistical model for databases is also motivated by the fact that while the attributes of an individual may be correlated, the records of a large number of individuals are generally independent or weakly correlated with each other. We thus model the database as a collection of n observations generated by a memory less source whose outputs are independent and identically   distributed.
Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective.
 The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods.
Modules :
  1. Registration
  2. Login
  3. Admin
  4. Encryption and Decryption
  5. Chart_view
                                                                Modules Description
                                    In this module Sender/User have to register first, then only he/she has to access the data base.
                                                In this module, any of the above mentioned person have to login, they should login by giving their email id and password .Admin login by giving username and password.
          Admin can see the details of the people who are published their personal data. Data are in encrypted form. He then decrypt it by using decryption and then only he will be able to see the original data 
                                The Receiver can only view the senders personal data by pictorial representation i.e chart.Chart will be prepared by applying the senders input.Also he can see the personal data in encrypted form.Registered users only can decrypt the data.We hide the correct income of the senders who pass the data to receivers.Receivers will be able to see the actual income of senders by applying some side informations.

System Configuration:-

H/W System Configuration:-

        Processor               -    Pentium –III

Speed                                -    1.1 GHz
RAM                                 -    256 MB (min)
Hard Disk                          -   20 GB
Floppy Drive                     -    1.44 MB
Key Board                         -    Standard Windows Keyboard
Mouse                                -    Two or Three Button Mouse
Monitor                              -    SVGA

S/W System Configuration:-

v   Operating System            :Windows95/98/2000/XP
v   Application  Server          :   Tomcat5.0/6.X                                                  
v   Front End                          :   HTML, Java, Jsp
v    Scripts                                :   JavaScript.
v   Server side Script             :   Java Server Pages.
v   Database                            :   My sql
v   Database Connectivity      :   JDBC.

The ability to achieve the desired level of privacy while guaranteeing a minimal level of utility and vice-versa for a general data source is paramount. Our work defines privacy and utility as fundamental characteristics of data sources that may be in conflict and can be traded off. This is one of the earliest attempts at systematically applying information theoretic techniques to this problem. Using rate-distortion
theory, we have developed a U-P tradeoff region for i.i.d. data sources with known distribution.

No comments:

Post a Comment