Accuracy-Constrained Privacy Preserving Access Control Mechanism for Relational Data 
Accuracy-Constrained Privacy Preserving Access Control 
Mechanism for Relational Data 
Access control mechanisms protect sensitive information from unauthorized users. However, 
when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, 
an authorized user can still compromise the privacy of a person leading to identity disclosure. A 
PPM can use suppression and generalization of relational data to anonymize and satisfy privacy 
requirements, e.g., k-anonymity and l-diversity, against identity and attribute disclosure. 
However, privacy is achieved at the cost of precision of authorized information. In this paper, we 
propose an accuracy-constrained privacy-preserving access control framework. The access 
control policies define selection predicates available to roles while the privacy requirement is to 
satisfy the k-anonymity or l-diversity. An additional constraint that needs to be satisfied by the 
PPM is the imprecision bound for each selection predicate. The techniques for workload-aware 
anonymization for selection predicates have been discussed in the literature. However, to the best 
of our knowledge, the problem of satisfying the accuracy constraints for multiple roles has not 
been studied before. In our formulation of the aforementioned problem, we propose heuristics for 
anonymization algorithms and show empirically that the proposed approach satisfies imprecision 
bounds for more permissions and has lower total imprecision than the current state of the art. 
The concept of privacy-preservation for sensitive data can require the enforcement of privacy 
policies or the protection against identity disclosure by satisfying some privacy requirements. 
Investigate privacy-preservation from the anonymityaspect. The sensitive information, even after 
the removal of identifying attributes, is still susceptible to linking attacks by the authorized users. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Minimize the imprecision aggregate for all queries . 
 The imprecision added to each permission/query in the anonymized micro data is not 
Contact: 9703109334, 9533694296 
ABSTRACT: 
EXISTING SYSTEM: 
known. 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Accuracy-Constrained Privacy Preserving Access Control Mechanism for Relational Data 
 Not satisfying accuracy constraints for individual permissions in a policy/workload. 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Accuracy-Constrained Privacy Preserving Access Control Mechanism for Relational Data 
 The heuristics proposed in this paper for accuracy constrained privacy-preserving access 
control are also relevant in the context of workload-aware anonymization. 
 The framework is a combination of access control and privacy protection mechanisms. 
 The access control mechanism allows only authorized query predicates on sensitive data. 
 The privacy preserving module anonymizes the data to meet privacy requirements and 
imprecision constraints on predicates set by the access control mechanism. 
ADVANTAGES OF PROPOSED SYSTEM: 
 Formulate the accuracy and privacy constraints. 
 Concept of accuracy-constrained privacy-preserving access control for relational data. 
 Approximate the solution of the k-PIB problem and conduct empirical evaluation. 
SYSTEM ARCHITECTURE: 
Contact: 9703109334, 9533694296 
PROPOSED SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Accuracy-Constrained Privacy Preserving Access Control Mechanism for Relational Data 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
Zahid Pervaiz, Walid G. Aref, Senior Member, Arif Ghafoor, Fellow, and Nagabhushana 
Prabhu,“Accuracy-Constrained Privacy-Preserving Access Control Mechanism for 
Relational Data”, IEEE TRANSACTIONS, VOL. 26, NO. 4, APRIL 2014. 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

More Related Content

DOC
Accuracy constrained privacy-preserving access control mechanism for relation...
DOC
Accuracy constrained privacy-preserving access control mechanism for relation...
DOCX
JPJ1415 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for ...
PPT
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
PPTX
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
PPTX
Scalable and secure sharing of personal health records in cloud computing usi...
PPTX
Final_attribute based encryption in cloud with significant reduction of compu...
Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...
JPJ1415 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for ...
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
Scalable and secure sharing of personal health records in cloud computing usi...
Final_attribute based encryption in cloud with significant reduction of compu...

What's hot (14)

PPTX
Scalable and secure sharing of public health record using attribute based Enc...
PPTX
Scalable and secure sharing of personal health records
PPTX
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
DOCX
Enforcing secure and privacy preserving information brokering in distributed ...
PDF
Personalized Sensing System
PPTX
kpit ppt
PDF
Scalable and secure sharing of personal health records in cloud computing us...
PPTX
Efficient sharing of personal health records using encryption in cloud computing
PDF
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
DOCX
An Attribute-based Controlled Collaborative Access Control Scheme for Public ...
PPTX
secured storage of Personal health record in cloude
DOCX
Enforcing secure and privacy preserving information brokering in distributed ...
PDF
Dotnet scalable and secure sharing of personal health records in cloud compu...
Scalable and secure sharing of public health record using attribute based Enc...
Scalable and secure sharing of personal health records
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
Enforcing secure and privacy preserving information brokering in distributed ...
Personalized Sensing System
kpit ppt
Scalable and secure sharing of personal health records in cloud computing us...
Efficient sharing of personal health records using encryption in cloud computing
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
An Attribute-based Controlled Collaborative Access Control Scheme for Public ...
secured storage of Personal health record in cloude
Enforcing secure and privacy preserving information brokering in distributed ...
Dotnet scalable and secure sharing of personal health records in cloud compu...
Ad

Similar to accuracy-constrained privacy preserving access control mechanism for relational data (20)

PDF
J018116973
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
DOCX
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
DOCX
Cloud assisted mobile-access of health data with privacy and auditability
PDF
Attribute Based Encryption with Attribute Hiding in Cloud Storage
PPTX
Cloud assisted mobile-access of health data with privacy and auditability
PDF
Access Policy Management For OSN Using Network Relationships
PDF
Accuracy constrained privacy-preserving
DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
PDF
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
PDF
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
PDF
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
DOCX
supporting privacy protection in personalized web search
PDF
Control Cloud Data Access Using Attribute-Based Encryption
PPTX
2nd rvw
PDF
Attribute-Based Data Sharing
DOCX
supporting privacy protection in personalized web search
J018116973
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
Cloud assisted mobile-access of health data with privacy and auditability
Attribute Based Encryption with Attribute Hiding in Cloud Storage
Cloud assisted mobile-access of health data with privacy and auditability
Access Policy Management For OSN Using Network Relationships
Accuracy constrained privacy-preserving
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
Scalable and secure sharing of personal health records in cloud computing usi...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
supporting privacy protection in personalized web search
Control Cloud Data Access Using Attribute-Based Encryption
2nd rvw
Attribute-Based Data Sharing
supporting privacy protection in personalized web search
Ad

More from swathi78 (20)

DOC
secure mining of association rules in horizontally distributed databases
DOCX
a system for denial-of-service attack detection based on multivariate correla...
DOCX
web service recommendation via exploiting location and qo s information
DOCX
privacy-enhanced web service composition
DOCX
optimal distributed malware defense in mobile networks with heterogeneous dev...
DOCX
friend book a semantic-based friend recommendation system for social networks
DOCX
efficient authentication for mobile and pervasive computing
DOCX
cooperative caching for efficient data access in disruption tolerant networks
DOCX
an incentive framework for cellular traffic offloading
DOCX
secure outsourced attribute-based signatures
DOCX
traffic pattern-based content leakage detection for trusted content delivery ...
DOCX
the design and evaluation of an information sharing system for human networks
DOCX
the client assignment problem for continuous distributed interactive applicat...
DOCX
sos a distributed mobile q&a system based on social networks
DOCX
securing broker-less publish subscribe systems using identity-based encryption
DOCX
rre a game-theoretic intrusion response and recovery engine
DOCX
on false data-injection attacks against power system state estimation modelin...
DOCX
loca ward a security and privacy aware location-based rewarding system
DOCX
exploiting service similarity for privacy in location-based search queries
DOCX
enabling trustworthy service evaluation in service-oriented mobile social net...
secure mining of association rules in horizontally distributed databases
a system for denial-of-service attack detection based on multivariate correla...
web service recommendation via exploiting location and qo s information
privacy-enhanced web service composition
optimal distributed malware defense in mobile networks with heterogeneous dev...
friend book a semantic-based friend recommendation system for social networks
efficient authentication for mobile and pervasive computing
cooperative caching for efficient data access in disruption tolerant networks
an incentive framework for cellular traffic offloading
secure outsourced attribute-based signatures
traffic pattern-based content leakage detection for trusted content delivery ...
the design and evaluation of an information sharing system for human networks
the client assignment problem for continuous distributed interactive applicat...
sos a distributed mobile q&a system based on social networks
securing broker-less publish subscribe systems using identity-based encryption
rre a game-theoretic intrusion response and recovery engine
on false data-injection attacks against power system state estimation modelin...
loca ward a security and privacy aware location-based rewarding system
exploiting service similarity for privacy in location-based search queries
enabling trustworthy service evaluation in service-oriented mobile social net...

Recently uploaded (20)

PPTX
Current and future trends in Computer Vision.pptx
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPTX
Fundamentals of Mechanical Engineering.pptx
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PPTX
Feature types and data preprocessing steps
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PDF
Visual Aids for Exploratory Data Analysis.pdf
PDF
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PPTX
Module 8- Technological and Communication Skills.pptx
PPTX
Management Information system : MIS-e-Business Systems.pptx
PPTX
CyberSecurity Mobile and Wireless Devices
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
III.4.1.2_The_Space_Environment.p pdffdf
Current and future trends in Computer Vision.pptx
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Fundamentals of Mechanical Engineering.pptx
"Array and Linked List in Data Structures with Types, Operations, Implementat...
Feature types and data preprocessing steps
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
Visual Aids for Exploratory Data Analysis.pdf
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
distributed database system" (DDBS) is often used to refer to both the distri...
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Module 8- Technological and Communication Skills.pptx
Management Information system : MIS-e-Business Systems.pptx
CyberSecurity Mobile and Wireless Devices
Information Storage and Retrieval Techniques Unit III
III.4.1.2_The_Space_Environment.p pdffdf

accuracy-constrained privacy preserving access control mechanism for relational data

  • 1. Accuracy-Constrained Privacy Preserving Access Control Mechanism for Relational Data Accuracy-Constrained Privacy Preserving Access Control Mechanism for Relational Data Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized user can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization of relational data to anonymize and satisfy privacy requirements, e.g., k-anonymity and l-diversity, against identity and attribute disclosure. However, privacy is achieved at the cost of precision of authorized information. In this paper, we propose an accuracy-constrained privacy-preserving access control framework. The access control policies define selection predicates available to roles while the privacy requirement is to satisfy the k-anonymity or l-diversity. An additional constraint that needs to be satisfied by the PPM is the imprecision bound for each selection predicate. The techniques for workload-aware anonymization for selection predicates have been discussed in the literature. However, to the best of our knowledge, the problem of satisfying the accuracy constraints for multiple roles has not been studied before. In our formulation of the aforementioned problem, we propose heuristics for anonymization algorithms and show empirically that the proposed approach satisfies imprecision bounds for more permissions and has lower total imprecision than the current state of the art. The concept of privacy-preservation for sensitive data can require the enforcement of privacy policies or the protection against identity disclosure by satisfying some privacy requirements. Investigate privacy-preservation from the anonymityaspect. The sensitive information, even after the removal of identifying attributes, is still susceptible to linking attacks by the authorized users. DISADVANTAGES OF EXISTING SYSTEM:  Minimize the imprecision aggregate for all queries .  The imprecision added to each permission/query in the anonymized micro data is not Contact: 9703109334, 9533694296 ABSTRACT: EXISTING SYSTEM: known. Email id: [email protected], www.logicsystems.org.in
  • 2. Accuracy-Constrained Privacy Preserving Access Control Mechanism for Relational Data  Not satisfying accuracy constraints for individual permissions in a policy/workload. Contact: 9703109334, 9533694296 Email id: [email protected], www.logicsystems.org.in
  • 3. Accuracy-Constrained Privacy Preserving Access Control Mechanism for Relational Data  The heuristics proposed in this paper for accuracy constrained privacy-preserving access control are also relevant in the context of workload-aware anonymization.  The framework is a combination of access control and privacy protection mechanisms.  The access control mechanism allows only authorized query predicates on sensitive data.  The privacy preserving module anonymizes the data to meet privacy requirements and imprecision constraints on predicates set by the access control mechanism. ADVANTAGES OF PROPOSED SYSTEM:  Formulate the accuracy and privacy constraints.  Concept of accuracy-constrained privacy-preserving access control for relational data.  Approximate the solution of the k-PIB problem and conduct empirical evaluation. SYSTEM ARCHITECTURE: Contact: 9703109334, 9533694296 PROPOSED SYSTEM: Email id: [email protected], www.logicsystems.org.in
  • 4. Accuracy-Constrained Privacy Preserving Access Control Mechanism for Relational Data SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL Zahid Pervaiz, Walid G. Aref, Senior Member, Arif Ghafoor, Fellow, and Nagabhushana Prabhu,“Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data”, IEEE TRANSACTIONS, VOL. 26, NO. 4, APRIL 2014. Contact: 9703109334, 9533694296 REFERENCE: Email id: [email protected], www.logicsystems.org.in