Fortification Support Access Control Manipulate Procedure Intended For Relational Data

Abstract

Present days majorly concentrated on meticulous speculation on data. Access control systems are every time touch with Safe and secrecy maintenance of data but now a days hackers acting like reliance. Then they are remove info from the user. Last few decades we are fight for the accuracy privacy preserving on data but however we not solved this type of issue. The Access control mechanism avoids the unauthorized access of sensitive information. It protects the user information from the unauthorized access. The privacy protection mechanism is a much important concern in the case of sharing the sensitive information. The privacy protection mechanism provides better privacy for the sensitive information which is to be shared. The generally used privacy protection mechanism uses the generalization and suppression of the sensitive data. It prevents the privacy disclosure of the sensitive data. The privacy protection mechanism avoids the identity and attributes disclosure. The privacy is achieved by the high accuracy and consistency of the user information, ie., the precision of the user information. In this paper, it proposes a privacy persevered access control mechanism for relational data. The literature survey might provide techniques for workload –aware anonymization for selection predicates, as the problem of satisfying the accuracy constraints for multiple roles has not been studied before. The purpose of the present project is to propose heuristics for anonymization algorithms and to show the viability of the proposed approach for empirically satisfying the imprecision bounds for more permission.

Authors and Affiliations

Puppala. S. P. K. Parameswari| Student of M.Tech (CSE) and Department of Computer Science Engineering, M. Madhavarao| Asst.Prof, Department of Computer Science and Engineering, AP

Keywords

Related Articles

Tweet Mining from General Elections of a Country

In previous election of a country for its democratic elections in which social media was targeted as a way to convince the social media users to attract their votes, an analysis of BigData on these elections tweets is...

A Graph theory algorithmic approach to data clustering and its Application

Clustering is the unproven classification of data items, into groups known as clusters. The clustering problem has been discussed in many area of research in many disciplines; this reflects its huge usefulness in the...

Face Recognition Based Security System Using Sift Algorithm

Present days most of the door lock systems are organized by humans with the application of keys, secured password & unpredictable pattern to operate the door. The purpose of this paper is to help the users to develop...

A Case Study Of: Clint Relationship Management (CRM) Practices In Selected Organized Retail Outlets

Today in the profoundly aggressive business sector, expanding client requests retail outlets understand the significance of client relationship administration. The absence of comprehension on Customer Relationship Ma...

We propose another revocable IBE plot with a cloud revocation authority (CRA) to unravel the two inadequacies, to be specific, the execution is essentially enhanced and the CRA holds just a framework mystery for ever...

Download PDF file
  • EP ID EP16587
  • DOI -
  • Views 340
  • Downloads 10

How To Cite

Puppala. S. P. K. Parameswari, M. Madhavarao (2015). Fortification Support Access Control Manipulate Procedure Intended For Relational Data. International Journal of Science Engineering and Advance Technology, 3(10), 679-682. https://europub.co.uk/articles/-A-16587