A Novel System for Privacy-Preserving Access Control for Relational Data with Accuracy
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 8
Abstract
Access Control is a set of controls to restrict access to certain resources. If we think about it, access controls are everywhere around us. A door to your room, the guards allowing you to enter the office building on seeing your access card, swiping your card and scanning your fingers on the biometric system, a queue for food at the canteen or entering your credentials to access FB, all are examples of various types of access control. Here we focus only on the logical Access Control mechanisms. Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized user can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization of relational data to anonymize and satisfy privacy requirements, e.g., k-anonymity and ldiversity, against identity and attribute disclosure. However, privacy is achieved at the cost of precision of authorized information. In this paper, we propose an accuracy-constrained privacy-preserving access control framework. The access control policies define selection predicates available to roles while the privacy requirement is to satisfy the k-anonymity or l-diversity. An additional constraint that needs to be satisfied by the PPM is the imprecision bound for each selection predicate. The techniques for workload-aware anonymization for selection predicates have been discussed in the literature. However, to the best of our knowledge, the problem of satisfying the accuracy constraints for multiple roles has not been studied before. In our formulation of the aforementioned problem, we propose heuristics for anonymization algorithms and show empirically that the proposed approach satisfies imprecision bounds for more permissions and has lower total imprecision than the current state of the art.
Authors and Affiliations
Sai Sirisha Chittineni| M.Tech (CSE), NRI Institute of Technology, A.P., India, Bandarupalli Mouleswara Rao| Assoc Professor, Dept. of Computer Science & Engineering, NRI Institute of Technology, A.P., India
Analysis of Hyoid Structured And Perforated Pinfin Heat Sink In Inline And Staggered Flow
The usage of the electronic goods has been increased tremendously; hence it is the challenging task to improve the cooling for such devices. The heat dissipation rate should be maximized in the electronic devices lik...
Proficient Authentication Mechanism for Mobile and Pervasive Computing
Mobile Computing is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link. With today’s technology...
Extermination of DDoS Attack By Software Puzzle System
DoS/DDoS attaacks are among the genuine risks to computerized security, and client confound, which asks for a client to perform computationally costly operations before being surrendered organizations from a server,...
Providing Best Quality Of Video Streaming Using Ames Method
In wireless networks(mobile networks) the wireless link capacity cannot be stable with the demand of traffic over the networks. Due to the gap between the traffic demand and the link capacity it results in poor servic...
Modeling And Biomechanical Analysis Of Human Knee Joint
The main objective of the present work is to implement the computer aided technology to study the biomechanical behavior of human knee joint which consists of Femur, Tibia, Patella, Menisci, Posterior Cruciate Ligame...