Fortification Support Access Control Manipulate Procedure Intended For Relational Data

Abstract

Present days majorly concentrated on meticulous speculation on data. Access control systems are every time touch with Safe and secrecy maintenance of data but now a days hackers acting like reliance. Then they are remove info from the user. Last few decades we are fight for the accuracy privacy preserving on data but however we not solved this type of issue. The Access control mechanism avoids the unauthorized access of sensitive information. It protects the user information from the unauthorized access. The privacy protection mechanism is a much important concern in the case of sharing the sensitive information. The privacy protection mechanism provides better privacy for the sensitive information which is to be shared. The generally used privacy protection mechanism uses the generalization and suppression of the sensitive data. It prevents the privacy disclosure of the sensitive data. The privacy protection mechanism avoids the identity and attributes disclosure. The privacy is achieved by the high accuracy and consistency of the user information, ie., the precision of the user information. In this paper, it proposes a privacy persevered access control mechanism for relational data. The literature survey might provide techniques for workload –aware anonymization for selection predicates, as the problem of satisfying the accuracy constraints for multiple roles has not been studied before. The purpose of the present project is to propose heuristics for anonymization algorithms and to show the viability of the proposed approach for empirically satisfying the imprecision bounds for more permission.

Authors and Affiliations

Puppala. S. P. K. Parameswari| Student of M.Tech (CSE) and Department of Computer Science Engineering, M. Madhavarao| Asst.Prof, Department of Computer Science and Engineering, AP

Keywords

Related Articles

Clint Relationships Through Mobile Crm In Organized Retail Outlets

Versatile Customer Relationship Management (mCRM) framework is one of the late progressions in CRM frameworks. Late years, clients utilizing cell telephone have displayed a quickly developing on quality included admi...

Transparent User Authentication Using Biometric Traits for Secure Internet Services

In this innovation time security of electronic applications is a genuine worry, because of the late increment in the recurrence and many-sided quality of digital assaults, biometric methods offer developing answer fo...

Mechanisms of Bioinformatics

The article plans to acquaint computer researchers with the new field of bioinformatics. The article gives a 10,000 foot perspective of the essential ideas in atomic cell science diagrams the way of the current infor...

Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks

security to the data is actually provided by an authentication. Authentication involves a process of confirming an identity. In Wireless sensor networks a lot of message authentication schemes have been developed, ba...

A Three Phase Four Wire Network Based Interleaved HighFrequency Inverter with Single-Reference Eight-Pulse-Modulation Technique for Fuel Cell Vehicle Applications

This paper presents a three phase four leg inverter with neutral connected to load. The inverter hybrid modulation technique consisting of singe-reference eight-pulse-modulation (SREPM) for front-end dc/dc converter...

Download PDF file
  • EP ID EP16587
  • DOI -
  • Views 297
  • Downloads 10

How To Cite

Puppala. S. P. K. Parameswari, M. Madhavarao (2015). Fortification Support Access Control Manipulate Procedure Intended For Relational Data. International Journal of Science Engineering and Advance Technology, 3(10), 679-682. https://europub.co.uk/articles/-A-16587