Precision Controlled Secrecy Stabilization in Relational Data

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1

Abstract

Abstract: Data privacy issues are increasingly becoming important for many applications. Protective individual privacy is a crucial downside. However, sensitive data will still be ill-used by approved users to compromise the privacy of shoppers. Traditionally, research in the database community in the area of data security can be broadly classified into access control research and data privacy research. Access Control Mechanisms (ACM) is used to ensure that only authorized information is available to users. Privacy Protection Mechanism (PPM) uses suppression and generalization of relational data to anonymize and satisfy privacy needs. The privacy preservation can be achieved through anonymization techniques like generalization or suppression. Along with privacy the precision of the authorized data is important. The aim of the work is to provide better security and minimum level of precision to the retrieved data, for that in this paper an accuracyconstrained privacy preserving access control mechanism is implemented with additional constraint on each selection predicate called imprecision bounds. The accuracy constraints are satisfied for multiple roles also. Along with that a workload aware anonymization concept is used for selection predicates. The experimental results shows proposed system with multilevel anonymization works better in terms of precision, privacy for more permissions than current state of art.

Authors and Affiliations

Rajkumar Lingamgunta , Jajula Hari Babu

Keywords

Related Articles

 A Review onImage Mining Techniques and its application on asoftware BOND

Abstract: Image processing is one of the most researched areas in computer science and it finds numerousapplications in various fields like, medical research and diagnosis, geological research, crime investigation,and so...

 Providing The Security Against The DDOS Attack In Mobile AdHoc Networks

 Abstract: The extensive applications of Mobile ad hoc networks are in civilian and military. In the MANETsnodes are joining to any point and leave the network at any point of time. This generic characteristic of MA...

 Modulo Search Trees (Plain and Z-Overlapped)

 Abstract: This paper exploits the modulo division operation to construct a tree which is termed as Modulo search tree with two versions out of which one is coined as Plain Modulo Search Tree and the other is termed...

 Study of Online Banking Security Mechanism in India: Take  ICICI Bank as an Example

 Internet banking has gained wide acceptance internationally and seems to be fast catching up in India with more and more banks entering the fray. online banking is defined as the use of Internet as a remote &nbsp...

 Privacy Protection in Distributed Industrial System

 Abstract: Although awareness is constantly rising, that industrial computer networks (in a very broad sense)can be exposed to serious cyber threats, many people still think that the same countermeasures, developed...

Download PDF file
  • EP ID EP138413
  • DOI -
  • Views 126
  • Downloads 0

How To Cite

Rajkumar Lingamgunta, Jajula Hari Babu (2016). Precision Controlled Secrecy Stabilization in Relational Data. IOSR Journals (IOSR Journal of Computer Engineering), 18(1), 69-73. https://europub.co.uk/articles/-A-138413