Loading

Lightweight Centralised Digital Repository for Personal Data Management with Privacy Preservation Policy
Arun Kumar. S1, Anbarasi M.S.2

1Arunkumar. S, Research Scholar, Department of Computer Science and Engineering, Pondicherry Engineering College, Pondicherry University, Puducherry, India.
2Anbarasi M.S, Assistant Professor, Department of Information Technology, Pondicherry Engineering College, Pondicherry University, Puducherry, India.

Manuscript received on 18 June 2019 | Revised Manuscript received on 25 June 2019 | Manuscript published on 30 June 2019 | PP: 1627-1631 | Volume-8 Issue-5, June 2019 | Retrieval Number: E7541068519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The on-going increment in announced episodes of reconnaissance and security breaks bargaining clients’ privacy raise doubt about the present model, in which third-parties gather and control huge measures of individual information. Bitcoin has shown in the budgetary space that trusted, auditable registering is conceivable utilizing a decentralized system of companions joined by an open record. In this paper, we portray centralized individual information the board framework that guarantees clients possess and control their information. We implement a centralized privacy preservation protocol that turns a block chain into an automated data verification manager that does not require trust in a third party for verification. Not at all like Bitcoin, exchanges in our framework are not carefully money related – they are utilized to convey directions, for example, storing, questioning and sharing information particularly verification . At last we examine use of centralized privacy preservation protocol for manage the personal data in centralized manner.
Keywords: Bitcoin, Centralized, Privacy, Personal Data, Verification.

Scope of the Article: Data Management