Abstract

AbstractOnline company for various fields now has high margins due to its more transparent and complex nature. Several data holders’ data can be shared with third-party vendors when conducting online business, and those third-party vendors can then share it with end users through those data vendors. If the data owner wishes to sell any digital content over online sources when processing these things, it is presently very difficult to keep track of data protection, privacy, and honesty while doing it. In this paper, privacy preserving and authentication and access control scheme in data markets are implemented. In this, online database performs the revocation and registration process. First, user should register with raw data. The raw data will be authenticated using authenticated data encryption technique. Next, this encrypted data will be processed using data processing. Pseudo-identity generation will provide the password for driver authentication. After data is encrypted, it is verified. This is verified based on two batches. First batch will be used for verification, and second batch will collect the encrypted data. At last, online data will be secured very effectively.KeywordsData marketsData truthfulnessPrivacy preservationSecurityTPMHomomorphic encryption

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call