A New Heuristic Approach For Hide Valuable Information Of Organizations

Abstract

Organizations accumulate and analyze customer data to pick up their services. Access Control Mechanisms(ACM) is used to make sure that only authorized information is on hand to users. Onthe other hand, sensitive information can at rest be changed by authorized users to conciliation the privacy of consumers. We use the perception of imprecision bound for permission to characterize a porch on the quantity of imprecision that can be tolerated. Existing workload aware anonymization techniques decrease the imprecision combined for all queries and the vagueness added to each permission/query in the anonymized micro data is not acknowledged. Creation the privacy requirement more rigorous (e.g., increasing the value of k or l) results in extra imprecision for queries. However the dilemma of enjoyable exactness constriction for entity permissions in a policy/workload has not been considered before. The heuristics proposed in this paper for accuracy-constrained privacy-preserving access control are also significant in the framework of workload-aware anonymization.

Authors and Affiliations

N. Aruna Sandhya Dr. B. Sujatha

Keywords

Related Articles

PERFECTIONS AND PSYCHIATRING USER PROFILE IN WEB SITES USING WEB USAGE MINING & CLUSTERING SESSIONS

The web site under study is part of a nonprofit organization that does not "sell" any products, it was crucial to understand "who" the users Ire, "what" they looked at, and "how their interests changed with time," al...

Two Techniques for Analyze Network Traffic to Identify Dos Attack

Highlights of the geometric relationships between the network traffic is not a perfect system functionality by taking out the correlation Multivariate analysis (MCA) is to show that the framework of a DoS attack. In...

Empowering Document Clustering Through Multi View-Point Based Similarity Measure

Among data mining technique, clustering is one of the most important and traditional concept also an unsupervised learning paradigm. Similarity of a document pairs can be measured by matching of concepts. Finding or...

Matrix Subtraction Of Image Pixels Based on ARM9 And Embedded Linux For Motion Detection System

In this paper ,Proposed a Matrix Subtraction of image pixels for motion detection by using friendly ARM9 Board Supported Package S3C2440 supported by embedded linux. By using this technology, it is possible to monitor...

Applications of Graph Labeling in Major Areas of Computer Science

The field of Graph Theory plays a vital role in various fields. In Graph theory main problem is graph labeling. Graph Labeling is the assignment of integer’s form 1 to n for vertex, edges and both of the graphs respec...

Download PDF file
  • EP ID EP28246
  • DOI -
  • Views 251
  • Downloads 3

How To Cite

N. Aruna Sandhya Dr. B. Sujatha (2015). A New Heuristic Approach For Hide Valuable Information Of Organizations. International Journal of Research in Computer and Communication Technology, 4(9), -. https://europub.co.uk/articles/-A-28246