Precision Controlled Secrecy Stabilization in Relational Data
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1
Abstract
Abstract: Data privacy issues are increasingly becoming important for many applications. Protective individual privacy is a crucial downside. However, sensitive data will still be ill-used by approved users to compromise the privacy of shoppers. Traditionally, research in the database community in the area of data security can be broadly classified into access control research and data privacy research. Access Control Mechanisms (ACM) is used to ensure that only authorized information is available to users. Privacy Protection Mechanism (PPM) uses suppression and generalization of relational data to anonymize and satisfy privacy needs. The privacy preservation can be achieved through anonymization techniques like generalization or suppression. Along with privacy the precision of the authorized data is important. The aim of the work is to provide better security and minimum level of precision to the retrieved data, for that in this paper an accuracyconstrained privacy preserving access control mechanism is implemented with additional constraint on each selection predicate called imprecision bounds. The accuracy constraints are satisfied for multiple roles also. Along with that a workload aware anonymization concept is used for selection predicates. The experimental results shows proposed system with multilevel anonymization works better in terms of precision, privacy for more permissions than current state of art.
Authors and Affiliations
Rajkumar Lingamgunta , Jajula Hari Babu
I-ViDE: An Improved Vision-Based Approach for Deep Web Data Extraction
Abstract: Deep Web contents are accessed by queries submitted to Web databases and the returned data records are enwrapped in dynamically generated Web pages (they will be called deep Web pages in this paper). Extr...
A Proposed Method to Develop Shared Papers for Researchers at Conference
Abstract: In conferences, the topics of interest for papers include variety of subjects, if the researcher wants to write a shared researched paper on specific subject with another researcher who is also interested in th...
A Survey on Digital Image Authentication by DCT and RPM Based Watermarking
Abstract: An image watermarking, data is embedded into cover media to prove ownership. Various Watermarking techniques are proposed by several authors within the last many years that embody spatial domain and transform d...
Intelligence Billing System Using Radio Frequency Identification(RFID) and ZIGBEE
Abstract: As we know that there is a huge crowd in the malls in metro cities. Especially it becomes morecrowded on holidays. People purchase different items in the malls and puts them in the trolley. At the cashcounter b...
SSL-QA: Analysis of Semi-Supervised Learning for QuestionAnswering
Open domain natural language question answering (QA) is a process of automatically finding answers to questions searching collections of text files. Question answering (QA) is a long-standing challenge in NLP, and the co...