Transcript

DATABASE SECURITY

MOTIVATION

Medical data

Consumer purchase data

Census data

Communication and media-related data

Data gathered by government agencies

Unauthorized Exposure

Malicious Attempt To Steal And

Modify The Data

Hackers

METHOD•Level of noise between the original and distorted data is found out.• If it is higher than the threshold

value, then it can be easily hacked.• Data holder add some more noise.• Process repeated until it falls within

minimum threshold value.• Thus the privacy level is raised.

PERFORMANCE

EVALUVATION

• The proposed system is trained to overcome both the linear and non-linear attacks from the hackers.

• The existing system deals only with linear attacks.

• Checking with the existing noise level until there is no similarity we can increase the privacy to greater extent.

Additive

petrubatio

n

Multiplicative

petrubation

Non linear perturbation Petrubation techniques