<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<article xlink="http://www.w3.org/1999/xlink" dtd-version="1.0" article-type="technology" lang="en"><front><journal-meta><journal-id journal-id-type="publisher">IJCRR</journal-id><journal-id journal-id-type="nlm-ta">I Journ Cur Res Re</journal-id><journal-title-group><journal-title>International Journal of Current Research and Review</journal-title><abbrev-journal-title abbrev-type="pubmed">I Journ Cur Res Re</abbrev-journal-title></journal-title-group><issn pub-type="ppub">2231-2196</issn><issn pub-type="opub">0975-5241</issn><publisher><publisher-name>Radiance Research Academy</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">1806</article-id><article-id pub-id-type="doi"/><article-id pub-id-type="doi-url"/><article-categories><subj-group subj-group-type="heading"><subject>Technology</subject></subj-group></article-categories><title-group><article-title>PRIVACY-PRESERVING UPDATES TO ANONYMOUS AND CONFIDENTIAL DATABASES USING CRYPTOGRAPHY WITH ARM&#13;
</article-title></title-group><contrib-group><contrib contrib-type="author"><name><surname>anitha.T</surname><given-names>V</given-names></name></contrib><contrib contrib-type="author"><name><surname>Deborah</surname><given-names>Judeth</given-names></name></contrib><contrib contrib-type="author"><name><surname>G.S.Sooriya</surname><given-names/></name></contrib><contrib contrib-type="author"><name><surname>Aruna.V</surname><given-names/></name></contrib></contrib-group><pub-date pub-type="ppub"><day>25</day><month>05</month><year>2012</year></pub-date><volume>)</volume><issue/><fpage>62</fpage><lpage>66</lpage><permissions><copyright-statement>This article is copyright of Popeye Publishing, 2009</copyright-statement><copyright-year>2009</copyright-year><license license-type="open-access" href="http://creativecommons.org/licenses/by/4.0/"><license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution (CC BY 4.0) Licence. You may share and adapt the material, but must give appropriate credit to the source, provide a link to the licence, and indicate if changes were made.</license-p></license></permissions><abstract><p>Databases represent an important asset for many applications but their security is crucial. Today scenario there is an increased concern for privacy and confidentiality. Databases recording a variety of information about individuals which will be maintained by database owners and users respectively. If Alice owns a Kanonymous database and needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Also, suppose that access to the database is strictly controlled, allowing Alice to directly read the contents of the database breaks the privacy of Bob. (e.g., a patient?s medical record). Thus,&#13;
the problem is to check whether the database inserted with the tuple is K-anonymous, without letting Alice and Bob know the contents of the tuple and the database respectively. To preserve and secure this database and its updates cryptography is used. In this paper, the existing cryptography is software based. The proposed system is hardware and software based using ARM processor. This system provides protection against brute force rewind attacks, offline parallel attacks, and other cryptanalysis attacks.&#13;
</p></abstract><kwd-group><kwd>Privacy</kwd><kwd> anonymity</kwd><kwd> data management</kwd><kwd> secure computation.</kwd></kwd-group></article-meta></front></article>
