Precision Controlled Secrecy Stabilization in Relational Data
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1
Abstract
Abstract: Data privacy issues are increasingly becoming important for many applications. Protective individual privacy is a crucial downside. However, sensitive data will still be ill-used by approved users to compromise the privacy of shoppers. Traditionally, research in the database community in the area of data security can be broadly classified into access control research and data privacy research. Access Control Mechanisms (ACM) is used to ensure that only authorized information is available to users. Privacy Protection Mechanism (PPM) uses suppression and generalization of relational data to anonymize and satisfy privacy needs. The privacy preservation can be achieved through anonymization techniques like generalization or suppression. Along with privacy the precision of the authorized data is important. The aim of the work is to provide better security and minimum level of precision to the retrieved data, for that in this paper an accuracyconstrained privacy preserving access control mechanism is implemented with additional constraint on each selection predicate called imprecision bounds. The accuracy constraints are satisfied for multiple roles also. Along with that a workload aware anonymization concept is used for selection predicates. The experimental results shows proposed system with multilevel anonymization works better in terms of precision, privacy for more permissions than current state of art.
Authors and Affiliations
Rajkumar Lingamgunta , Jajula Hari Babu
A Survey Paper on Cluster Head Selection Techniques for MobileAd-Hoc Network
Abstract: Wireless Technologies are very useful due to their use. Mobile Ad-hoc Network (MANET) hasbecome an essential technology in field of research In MANET, Clustering is an important research area, itoffers se...
Performance measurement of MANET routing protocols underBlackhole security attack
Abstract: Unlike wired networks or other wireless networks, where the nodes communicate with each other viaan access point or a base station, wireless Mobile ad hoc network is an infrastructure less network where t...
Enhanced Data Processing Using Positive Negative Association Mining on AJAX Data
Knowledge discovery is the process of analyzing data from different perspectives and summarizing it into useful information. [1] Association rule mining is a data mining process used widely in traditional databases to fi...
Bluetooth Messenger: an Android Messenger app based on Bluetooth Connectivity
Abstract: The project discussed here is an Android messenger application which connects using Bluetooth. The main concepts discussed here are : i) Bluetooth connection between two or more android smart phones, wher...
Anti-spam Filter Based on Machine Learning Algorithm
We building one of the filter which help the user relief from the unwanted mails in his inbox of the mail account which is develop using the machine learning algorithm and which also contain the filter.In this we c...