In the modern world data privacy is very important during the Transaction process. Whenever user give his/her information he is not sure whether the information will be secure or not. Privacy Preservation mainly deals with the hiding of the user data with his/her choice. In our paper we basically dealing with the privacy issue that is how it can be secure during the time it travels to databases/data warehouse. For this purpose we implemented the algo based on bayes Estimation. This algo basically works on bayes probability that is we basically applied on the email system. Whenever the user types any mail his whole mail will be process through our algo which uses the word list from the stored data base and if the mail is fine and not contains any threat material than it will get stored in the data base. Our algo basically counts the conditional probability of the words from the number which is given in the data base. First of all words are assigned the threat numbers according to the previous usage in the transaction process in internet than their total count is done which finally uses in the probability. This probably if greater than assigned probability i.e. in our case .5 than it will get stored in the database otherwise it gets discarded.
[1]
Ramakrishnan Srikant,et al.
Hippocratic Databases
,
2002,
VLDB.
[2]
Ramakrishnan Srikant,et al.
Implementing P3P using database technology
,
2003,
Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[3]
Sabah S. Al-Fedaghi.
How sensitive is your personal information?
,
2007,
SAC '07.
[4]
Sabah S. Al-Fedaghi,et al.
Beyond Purpose-Based Privacy Access Control
,
2007,
ADC.
[5]
Jeff Yan,et al.
A note on proactive password checking
,
2001,
NSPW '01.
[6]
Fabio Massacci,et al.
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
,
2007,
ICAIL.
[7]
Wei Zhao,et al.
A new scheme on privacy-preserving data classification
,
2005,
KDD '05.
[8]
Albert Levi,et al.
Towards a framework for security analysis of multiple password schemes
,
2008,
EUROSEC '08.