A New Heuristic Approach For Hide Valuable Information Of Organizations
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 9
Abstract
Organizations accumulate and analyze customer data to pick up their services. Access Control Mechanisms(ACM) is used to make sure that only authorized information is on hand to users. Onthe other hand, sensitive information can at rest be changed by authorized users to conciliation the privacy of consumers. We use the perception of imprecision bound for permission to characterize a porch on the quantity of imprecision that can be tolerated. Existing workload aware anonymization techniques decrease the imprecision combined for all queries and the vagueness added to each permission/query in the anonymized micro data is not acknowledged. Creation the privacy requirement more rigorous (e.g., increasing the value of k or l) results in extra imprecision for queries. However the dilemma of enjoyable exactness constriction for entity permissions in a policy/workload has not been considered before. The heuristics proposed in this paper for accuracy-constrained privacy-preserving access control are also significant in the framework of workload-aware anonymization.
Authors and Affiliations
N. Aruna Sandhya Dr. B. Sujatha
Scale Down Speculation and Exalt Network Performance
In mobile Ad hoc Networks are having dynamic nature of its network infrastructure and it is vulnerable to all types of attacks. Among these attacks the routing attacks getting more attention because its changing the...
Assemblage Statistics through Big Data in Cloud with Accredit Public Analyse
Cloud computing is constantly growing as a standard for sharing the information over the remote stockpiling in an online cloud server. Cloud administrations offers awesome enhancements for the clients to appreciate t...
Comparative analysis of clustering of spatial databases with various DBSCAN Algorithms
Clustering is still an important research issue in the data mining, because there is a continuous research in data mining for optimum clusters on spatial data. There are so many types of partition based and hierarcha...
The Goals of E- Learning and Distance Learning Towards The Educational Development of Nigerian Public Service
The goals of e – learning and distance learning towards the educational development of Nigerian Public Service cannot be overemphasized, hence the need to create more awareness on how to acquire higher academic knowl...
Novel Approach To Cell-Counting-Based Attack Against Tor
Different low-latency unidentified communication systems such as Tor and Anonymizer have been deliberate to make available anonymity service for users. In order to hide from view the communication of users, most of t...