Please use this identifier to cite or link to this item:
Title: Development of Computational Techniques for Preserving Privacy Using Secure Multi Party Computation Protocols
Researcher: Shukla Samiksha
Guide(s): G Sadashivappa
Keywords: Computation Security
Computer Science
Multi-Party Computations
Privacy and Confidentiality
University: CHRIST University
Completed Date: 18/05/2015
Abstract: Data related to individual wealth, financial status and health is sensitive and to ensure confidentiality of these data special mechanism is required. For betterment of research and development, requirement is right input from authorized users. Due to personal confidentiality concerns, it is very difficult to get individuals sensitive information even if it is for mutual benefits. To get the real time data from actual users is critical to achieve extraordinary quality research outcomes. In collaborative computation participants are unwilling to provide straight answers when the questions involve personal information. The service providers who collect s data need to establish substantial trust with the parties. The confidentiality and integrity guarantees of the proposed protocols can simplify this issue. newlinePrivacy preservation is a big challenge for the data generated from various sources such as social networking sites, online transactions, weather forecast to name a few. The socialization of the internet and cloud computing generates pica bytes of unstructured data online with intrinsic values. The inflow of big data and the requirement to move this information throughout an organization has become a new target for hackers. The collaborative computation data is subject to confidentiality laws and should be protected. newlinePeople are more interested toward outsourcing work to a third party rather than maintaining their own resources, in this circumstance there is a requirement of insuring security from the service provider as it may lead to security breaches and party may not be interested in such service providers. newlineSecure multi-party computations deals with collection of challenges in which the requirement is the collaborative computation result. This computation needs input from multiple parties, but all the parties are concerned about their individual input.
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File124.38 kBAdobe PDFView/Open
02_certificate.pdf183.79 kBAdobe PDFView/Open
03_abstract.pdf189.72 kBAdobe PDFView/Open
04_declaration.pdf262.03 kBAdobe PDFView/Open
05_acknowledgement.pdf92.4 kBAdobe PDFView/Open
07_list_of_tables.pdf96.82 kBAdobe PDFView/Open
08_list_of_figures.pdf206.65 kBAdobe PDFView/Open
09_abbreivation.pdf86.69 kBAdobe PDFView/Open
10_chapter1.pdf651.39 kBAdobe PDFView/Open
11_chapter2.pdf552.33 kBAdobe PDFView/Open
12_chapter3.pdf517.18 kBAdobe PDFView/Open
13_chapter4.pdf712.63 kBAdobe PDFView/Open
14_chapter5.pdf758.99 kBAdobe PDFView/Open
15_chapter6.pdf1.62 MBAdobe PDFView/Open
16_chapter7.pdf369.65 kBAdobe PDFView/Open
17_bibliography.pdf412.95 kBAdobe PDFView/Open
18_list_of_publications.pdf200.3 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.