Top Banner
17
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Securityofdata
Page 2: Securityofdata
Page 3: Securityofdata

DATABASE SECURITY

Page 4: Securityofdata

MOTIVATION

Medical data

Consumer purchase data

Census data

Communication and media-related data

Data gathered by government agencies

Page 5: Securityofdata

Unauthorized Exposure

Malicious Attempt To Steal And

Modify The Data

Hackers

Page 6: Securityofdata
Page 7: Securityofdata
Page 8: Securityofdata
Page 9: Securityofdata
Page 10: Securityofdata

METHOD•Level of noise between the original and distorted data is found out.• If it is higher than the threshold

value, then it can be easily hacked.• Data holder add some more noise.• Process repeated until it falls within

minimum threshold value.• Thus the privacy level is raised.

Page 11: Securityofdata
Page 12: Securityofdata
Page 13: Securityofdata
Page 14: Securityofdata

PERFORMANCE

EVALUVATION

• The proposed system is trained to overcome both the linear and non-linear attacks from the hackers.

• The existing system deals only with linear attacks.

• Checking with the existing noise level until there is no similarity we can increase the privacy to greater extent.

Page 15: Securityofdata

Additive

petrubatio

n

Multiplicative

petrubation

Non linear perturbation Petrubation techniques

Page 16: Securityofdata
Page 17: Securityofdata