M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015
Accuracy-Constrained Privacy-Preserving Cell Level Access Control Mechanism for Relational Data
Madhuri S. Lambe, Vrunda K. Bhusari
To prevent the misuse of sensitive data by the authorized users and provide both privacy and security of the sensitive data. New approach has investigated privacy-preservation from the anonymity aspect. The access control mechanisms and privacy preservation mechanisms protect the data from unauthorized or third party user. When there is a lack in privacy preserving mechanism (PPM) and data is shared with others, the authorized user may need to compromise the privacy of data or Information. The privacy preservation can be achieved through anonymization techniques like generalization or suppression. Along with privacy the precision of the authorized data is important. The aim of the work is to provide better security and minimum level of precision to the retrieved data, for that in this paper an accuracy constrained privacy preserving access control mechanism is implemented with additional constraint on each selection predicate called imprecision bounds. New approach plan to extend the proposed privacy-preserving cell level access control.Todays fast growing world, the malicious intent or hacking purpose also increasing. So there is a need to provide a better security to our system.
Keywords: Access Control, Anonymization, Privacy preservation, Query evaluation
Edition: Volume 4 Issue 6, June 2015
Pages: 2262 - 2267
How to Cite this Article?
Madhuri S. Lambe, Vrunda K. Bhusari, "Accuracy-Constrained Privacy-Preserving Cell Level Access Control Mechanism for Relational Data", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155798, Volume 4 Issue 6, June 2015, 2262 - 2267
119 PDF Views | 100 PDF Downloads
Similar Articles with Keyword 'Access Control'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1737 - 1740Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud
Nilam Musale, Vilas Gaikwad
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2712 - 2714Privacy Preserving DAC for Data in Cloud
Pankaj R. Chandre, Swati S. Gore
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1087 - 1088A Survey on the Various Techniques of Data Leakage Detection
Saranya S. Devan, Minu Lalitha Madhavu
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1752 - 1755SNPDAC: Secure Network Protocol with Data Access Controlling in WSN
Uttarkar Amit Ratikant, Hingoliwala H. A.
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2839 - 2841Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing
Sagar S. Sanghavi, Rajesh A. Auti
Similar Articles with Keyword 'Anonymization'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1253 - 1257Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing
Vandhana V
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1534 - 1539Data Anonymization Approach for Data Privacy
Padma L. Gaikwad, M. M. Naoghare
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 2058 - 2061Privacy Preserved Public Auditing for Distributed Data
Anes P. A., Neethu Francis
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 658 - 661A Better Approach for Privacy Preserving Data Publishing by Slicing
Mohd Faquroddin, G. Kiran Kumar
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2347 - 2349A Survey on Security and Accuracy Constrained Privacy Preserving Task Based Access Control Mechanism for Relational Data
Pratik Bhingardeve, D. H. Kulkarni
Similar Articles with Keyword 'Privacy preservation'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1640 - 1647Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines
Uma Maheswari.T, Dr.V. Kavitha
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 2144 - 2147Survey on Privacy Preservation in Content Based Information Retrieval
Bhagyashree V. Khapli, Manjushri A. Mahajan
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1345 - 1350Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks
Kapilesh S. Swami, Dr. P Sai Kiran
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1303 - 1306Survey on Privacy Preservation of Sensitive Data
Uma Ashok Huljanti, Dr. Srinivas Narasim Kini
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1982 - 1985Review: Firewall Privacy Preservation By Packet Filtering Management
Akshay Dattatray Kachare, Geeta Atkar
Similar Articles with Keyword 'Query evaluation'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1219 - 1220Efficient Query Evaluation over Wide Sparse Table
Akshatha Dange K, Siddanagowda G R
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2262 - 2267Accuracy-Constrained Privacy-Preserving Cell Level Access Control Mechanism for Relational Data
Madhuri S. Lambe, Vrunda K. Bhusari