Abstract

Secure multi party computation allows several parties to compute some function of their inputs without disclosing the actual input to one another. Secure sum computation is an easily understood example and the component of the various secure multi party computation solutions. Secure sum computation allows parties to compute the sum of their individual inputs without disclosing the inputs to one another. In this paper, we propose a protocol with more security, when a group of the computing parties want to know the data of some other party. I. INTRODUCTION The huge growth of the Internet and its easy access by common man created opportunities for joint computations by multiple parties. All the participating parties for the sake of their mutual benefit want to compute the common function of their inputs but at the same time they are worried about the privacy of their data. This subject of the information security is called secure multi party computation. This subject has two goals; one is the privacy of the individual data inputs and another is the correctness of the result. Mainly two models exist in the literature for the analysis of the secure multi party computation problems. Ideal model of the secure multi party computation uses a Trusted Third Party apart from the participating parties. Parties supply their inputs to the Trusted Third Party. Computation of the function is done by the Trusted Third Party and then the result is sent to all the parties. In this paradigm the trustworthiness of the Trusted Third Party is critically important because if the Trusted Third Party turns corrupt, it can supply the private inputs of one party to others. But it is extensively used model of the secure multi party computation due to its easy implementation and the protocols available which prevent the Trusted Third Party to act maliciously. Real model of the secure multi party computation does not use any Trusted Third Party but the parties themselves agree on some protocol for the computation. The parties behavior in the secure multi party computation is important to consider. An honest party follows the protocol and respects the privacy of other parties. A semi honest party follows the protocol but also tries to learn other information than the result. The corrupt party neither follows the protocol nor respects the privacy of other parties. Different protocols are needed for different secure multi party computation models and the behavior of the party. Solutions are available for secure multi party computation problems using cryptographic techniques, randomization techniques and anonymization methods. The subject of secure multi party computation has been evolved from two party comparison problems (1) to multiparty image template matching problems. Many specific secure multi party computation problems have been defined and analyzed by researchers like Private Information Retrieval, Selective Function Evaluation, Privacy-Preserving Database Query, Privacy-Preserving Geometric Computation, Privacy- Preserving Statistical Analysis, Privacy-Preserving Intrusion Detection and Privacy-Preserving Cooperative Scientific Computation. Based on these general secure multi party computation problems many real life applications have been emerged like Privacy- Preserving Electronic Voting, Privacy-Preserving Bidding and Auctions, Privacy-Preserving Social Network Analysis, Privacy-Preserving Signature and Face Detection, Etc. Secure sum computation problem of secure multi party computation can be defined as: How multiple parties can compute the sum of their input values without disclosing actual values to one another. Secure sum can work as the tool for the secure multi party computation solutions in the privacy preserving distributed data mining problems (2). We proposed a secure sum protocol using random numbers (2). In this paper, we proposed a novel changing neighbors approach Distributed RK secure sum protocol for achieving more security in case a group of the parties collude to know the private data of some other party. 1.1 Distributed Database Partition: - Database is divided into three main portioning horizontal partition, vertical partition and hybrid partition. 1.1.1 Horizontal Partitioning: - Horizontal partitioning divides the whole database into the number of small database according to the row splitting. So that the execution of query will be very fast as well as we will be able to provide more privacy to the portioned database.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.