International Journal of Engineering and Advanced Technology (IJEAT)
Secure multiparty protocols are used as third party protocols in the data hiding and security. The major problem is, there is no security scheme operated for data storage services between multi party protocols. To overcome this look-ahead approach, specifically for secure multiparty protocols to achieve distributed k-anonymity, this helps parties to decide if the utility benefit from the protocol is within an acceptable range before initiating the protocol. The look-ahead operation is highly localized and its accuracy depends on the amount of information.