Data Hiding and Secured Data Storage with Access Control towards Multiparty Protocols

Download Now
Provided by: International Journal of Engineering and Advanced Technology (IJEAT)
Topic: Storage
Format: PDF
Secure multiparty protocols are used as third party protocols in the data hiding and security. The major problem is, there is no security scheme operated for data storage services between multi party protocols. To overcome this look-ahead approach, specifically for secure multiparty protocols to achieve distributed k-anonymity, this helps parties to decide if the utility benefit from the protocol is within an acceptable range before initiating the protocol. The look-ahead operation is highly localized and its accuracy depends on the amount of information.
Download Now

Find By Topic