Anonymity enabled secure multi-party computation for Indian BPO

被引:0
作者
Mishra, D. K. [1 ]
Chandwani, M. [2 ]
机构
[1] RGPV, Acropolis Inst Technol & Res, Dept Comp Sc & Engn, Indore 453771, Madhya Pradesh, India
[2] Devi Ahilya Univ, Inst Engn & Technol, Indore 452017, Madhya Pradesh, India
来源
TENCON 2007 - 2007 IEEE REGION 10 CONFERENCE, VOLS 1-3 | 2007年
关键词
anonymity; security; privacy; trusted third party; secure multi-party computation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this Paper, we propose a new framework for secure multi-party computation that uses ambiguous user's identity. A huge amount of a potentially sensitive data exists in large a organization that needs to be mined. This raises concerns for people involved in the increased usage of data mining tools in both the public and private sectors. The utility to be gained from widespread data mining seems to come into direct conflict with an individual's need and right to privacy. A privacy preserving data mining solution aims at achieving the somewhat paradoxical property of enabling a data-mining algorithm to use data without ever actually "seeing" it. Thus, the benefits of data mining can be enjoyed, without compromising the privacy of concerned individuals. The very nature of huge amount of data during the mining needs to have such a framework with security. We propose the framework in the form a protocol for secure multiparty computation during data mining for BPO application. We also provide a suitable architecture that is tuned for this protocol to function.
引用
收藏
页码:1097 / +
页数:2
相关论文
共 17 条
[1]  
AGARWAL A, 2003, INFORM SHARING PRIVA, P109
[2]  
ATALLAH MJ, 2001, 7 INT WORKSH ALG DAT, P136
[3]   Security and composition of multiparty cryptographic protocols [J].
Canetti, R .
JOURNAL OF CRYPTOLOGY, 2000, 13 (01) :143-202
[4]  
DEMGARD I, P CRYPT 2005
[5]  
DU WL, 2001, 14 IEEE COMP SEC FDN
[6]  
DU WL, 2001, 200151 CERIAS PURD U
[7]  
Goldreich Oded, 1987, STOC, DOI DOI 10.1145/28395.28420
[8]  
KARGUPTA H, 1999, ADV DISTRIBUTED DATA
[9]   Parallel coin-tossing and constant-round secure two-party computation [J].
Lindell, Y .
JOURNAL OF CRYPTOLOGY, 2003, 16 (03) :143-184
[10]  
Lindell Y, 2000, LECT NOTES COMPUT SC, V1880, P36