GDP-An Accountable Data Transfer Across Multiple Entities

Sappa. Vasundhara, M. Parthasaradhi


We propose a novel answer for cross-site cold-start item suggestion, which intends to we show a nonspecific information genealogy structure GDP(Generic Data Protection) for information stream over different elements that take two trademark, main parts (i.e., proprietor and buyer). We characterize the correct security ensures required by such an information heredity system toward distinguishing proof of a liable substance, and recognize the streamlining non-denial and genuineness suppositions. We at that point create and break down a novel responsible information exchange convention between two elements inside a pernicious situation by expanding upon unmindful exchange, vigorous watermarking, and mark primitives. At long last, we play out a trial assessment to exhibit the common sense of our convention and apply our system to the vital information spillage situations of information outsourcing and interpersonal organizations.


“Chronology of data breaches,”

“Data breach cost,” http: // 01.

“Privacy rights clearinghouse,”

“Electronic Privacy Information Center (EPIC),”, 1994.

“Facebook in Privacy Breach,” SB10001424052702304772804575558484075236968.html.

“Offshore outsourcing,” 109938/Offshore outsourcing cited in Florida data leak.

A. Mascher-Kampfer, H. St ¨ogner, and A. Uhl, “Multiple re-watermarking scenarios,” in Proceedings of the 13th International Conference on Systems, Signals, and Image Processing (IWSSIP 2006). Citeseer, 2006, pp. 53–56.

P. Papadimitriou and H. Garcia-Molina, “Data leakage detection,” Knowledge and Data Engineering, IEEE Transactions on, vol. 23, no. 1, pp. 51–63, 2011.

“Pairing-Based Cryptography Library (PBC),”

I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” Image Processing, IEEE Transactions on, vol. 6, no. 12, pp. 1673–1687, 1997.

B. Pfitzmann and M. Waidner, “Asymmetric fingerprinting for larger collusions,” in Proceedings of the 4th ACM conference on Computer and communications security, ser. CCS ’97, 1997, pp. 151–160.

S. Goldwasser, S. Micali, and R. L. Rivest, “A digital signature scheme secure against adaptive chosen-message attacks,” SIAM J. Comput., vol. 17, no. 2, pp. 281–308, 1988.

A. Adelsbach, S. Katzenbeisser, and A.-R. Sadeghi, “A computational model for watermark robustness,” in Information Hiding. Springer, 2007, pp. 145–160.

J. Kilian, F. T. Leighton, L. R. Matheson, T. G. Shamoon, R. E. Tarjan, and F. Zane, “Resistance of digital watermarks to collusive attacks,” in IEEE International Symposium on Information Theory, 1998, pp. 271–271.

M. Naor and B. Pinkas, “Efficient oblivious transfer protocols,” in Proceedings of the Twelfth Annual ACM-SIAM Symposium on Discrete Algorithms, 2001, pp. 448–457

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.|

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at