📞 +91-7667918914 | ✉️ iarjset@gmail.com
International Advanced Research Journal in Science, Engineering and Technology
International Advanced Research Journal in Science, Engineering and Technology A Monthly Peer-Reviewed Multidisciplinary Journal
ISSN Online 2393-8021ISSN Print 2394-1588Since 2014
IARJSET aligns to the suggestive parameters by the latest University Grants Commission (UGC) for peer-reviewed journals, committed to promoting research excellence, ethical publishing practices, and a global scholarly impact.
← Back to VOLUME 2, ISSUE 7, JULY 2015

AN INTEGRATED FRAMEWORK FOR TO PROTECT SENSITIVE INFORMATION FROM AUTHORIZED USERS

M.Venkateswarlu, M.M.VenkataChalapahi, N.Kasi Viswanath

👁 4 views📥 0 downloads
Share: 𝕏 f in

Abstract: In Previous days to protect the Sensitive information from unauthorized users generally by using Access control mechanism. The integrated framework is a combination of Access control policies and Privacy Protection Mechanism (PPM). However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized user can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization of relational data to anonymize and satisfies privacy requirements, e.g., k-anonymity and l-diversity, against identity and attribute disclosure. In this paper, we propose an Integrated framework it s a combination of accuracy-constrained privacy-preserving access control framework. The access control policies define selection predicates available to roles while the privacy requirement is to satisfy the k-anonymity or l-diversity. An additional constraint that needs to be satisfied by the PPM is the imprecision bound for each selection predicate. The techniques for workload-aware anonymization for selection predicates have been discussed in the literature. However, to the best of our knowledge, the problem of satisfying the accuracy constraints for multiple roles has not been studied before. In this paper the focus is on a static relational table that is anonymized only once. To exemplify our approach, role-based access control is assumed.

Keywords: Access control polices, privacy, Anomity methods, Query evaluation.

How to Cite:

[1] M.Venkateswarlu, M.M.VenkataChalapahi, N.Kasi Viswanath, “AN INTEGRATED FRAMEWORK FOR TO PROTECT SENSITIVE INFORMATION FROM AUTHORIZED USERS,” International Advanced Research Journal in Science, Engineering and Technology (IARJSET), DOI: 10.17148/IARJSET.2015.2706

Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.