CONCLUSION ACKNOWLEDGEMENT REFERENCES Hospital Information Sharing based on Social Network Web.

Volume 56 – No.5, October 2012 29

5. CONCLUSION

This paper presents a review of privacy-preserving techniques for wireless sensor networks WSN against a local eavesdropper. Two main categories of privacy preserving techniques have been presented; data oriented and context- oriented respectively. The existing techniques have been compared in terms of context privacy preservation with respect to efficiency, overhead, delay, power consumption adversary, location, scalability against a local eavesdropper. In future these techniques can be modified and can be used to protect against a global eavesdropper who has a global view of the traffic at a time.

6. ACKNOWLEDGEMENT

Our thanks to the experts who have contributed towards the development of this paper.

7. REFERENCES

[1] K. Sohraby, D. Minoli and T. Znati. , “Wireless Sensor Network: Technology, Protocols and Applications: ” John Wiley Sons, 2007,pg10-11. [2] C. Ozturk, Y. Zhang, and W. Trappe. “Source-location privacy in energy constrained sensor network routing ”: In Proceedings of the 2nd ACM workshop on Security of Adhoc and Sensor Networks, 2004 [3] R. Agrawal, A. Evfimievski, R. Srikant,, “Information sharing across private databases in:” : Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, 2003, pp. 86 –97. [4] L. Sweeney, “ K-anonymity: a model for protecting privacy, International Journal on Uncertainty, Fuzziness and Knowledge based Systems ” 2 2 2002 557–570. pp. 86 – 97. [5] Na Li, Nan Zhang, Sajal K. Das, and Bhavani Thuraisingham,” Privacy preservation in wireless sensor networks: A state-of-the-art survey ”. Ad Hoc Networks 7 2009 1501 –1514. [6] Jean-Franois Raymond. Traffic analysis: Protocols, attacks, design issues and open problems. In Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, pages 10-29. Springer- Verlag New York, Inc., 2001. [7] Celal Ozturk, Yanyong Zhang, and Wade Trappe, “Source location privacy in energy-constrained sensor network routing ”. In SASN 04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 88-93, New York, NY, USA, 2004. ACM. [8] Y. Xi, L. Schwiebert, W.S. Shi, Preserving source location privacy in monitoring-based wireless sensor networks, in: Proceedings of the 20th International Parallel and Distributed Processing Symposium IPDPS 2006, April 2006. [9] K. Mehta, Donggang Liu, and M. Wright. “Location privacy in sensor networks against a global eavesdropper”. In IEEE International Conference on Network Protocols, 2007. ICNP 2007, pages 31-323, October 2007 [10] Jing Deng, Richard Han, and Shivakant Mishra. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In DSN 04: Proceedings of the 2004 International Conference on Dependable Systems and Networks, pages 637-646, Washington, DC, USA, 2004.IEEE Computer Society. [11] Yi Ouyang Zhengyi Le, Guanling Chen, James Ford, and Fillia Makedon.,“Entrapping adversaries for source protection in sensor networks ”. In WOWMOM 06: Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks, pages 23-34,Washington, DC, USA, 2006. IEEE Computer Society. [12] Jing Deng, Richard Han, and Shivakant Mishra. ,” Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks ” . In DSN 04: Proceedings of the 2004 International Conference on Dependable Systems and Networks, pages 637-646, Washington, DC, USA, 2004. IEEE Computer Society. [13] Y. Jian, S. Chen, Z. Zhang, a nd L. Zhang,”Protecting receiver-location privacy in wireless sensor networks. May 2007, pp. 1955-1963. [14] D. Liu and P. Ning, “Establishing pair wise keys in distributed sensor networks,” in Proceedings of 10 th ACM Conference on Computer and Communications Security CCS03, October 2003, pp. 52 –61. Volume 56 – No.5, October 2012 30 Efficiency Privacy Preservation Scheme for Distributed Digital Document using Cache-Cache Mechanism Shiny Malar F.R. Dept. Of Computer Science Engineering Noorul Islam University, Kumaracoil Kanyakumari District, India Jeya Kumar M.K Dept.Of Computer Application Noorul Islam University, Kumaracoil Kanyakumari District, India ABSTRACT In data mining, Privacy preservation plays a major role to provide an efficient communication for the users. Several methods have been employed for privacy preservation scheme they are Secured Multiparty Computation SMC, Data Transformation Technique DTT and Cryptographic Technique. Most of the recent works concentrated on SMC and DTT as the data mining sources are mainly distributed in nature. However cryptographic techniques need more overhead for preserving privacy in distributed data mining context. All these existing techniques are worked and concentrated on data sharing and not concerned about the privacy preservation between the participants on distributed data mining. To address these issues more sensitively, in this work, present a privacy preservation scheme using cache- cache mechanism for distributed digital document which includes text, images, etc.,. In the proposed effective privacy preservation scheme for distributed digital document using cache-cache mechanism [PPS-CCM], digital document sharing is done with cache-cache mechanism to reduce the overhead on increasing document sizes. The cache-cache mechanism maintains a cache inside a cache to preserve the details about the users who shared the secret parts of digital document which has been splitted in a scheme of visual cryptography. An experimental evaluation is done with sample set of digital documents and will be processed with the proposed PPS-CCM to estimate the performance of the proposed work in terms of privacy overhead, intensity of cache-cache for digital document sharing, Participant density with an existing texture overlapping and Fourier filtering schemes for color images in visual cryptography. Keywords Privacy preservation, Cache-cache mechanism, Digital document DD, Visual cryptography, distributed data, Secure Multi party computation, Color images.

1. INTRODUCTION