A New Heuristic Approach For Hide Valuable Information Of Organizations

Abstract

Organizations accumulate and analyze customer data to pick up their services. Access Control Mechanisms(ACM) is used to make sure that only authorized information is on hand to users. Onthe other hand, sensitive information can at rest be changed by authorized users to conciliation the privacy of consumers. We use the perception of imprecision bound for permission to characterize a porch on the quantity of imprecision that can be tolerated. Existing workload aware anonymization techniques decrease the imprecision combined for all queries and the vagueness added to each permission/query in the anonymized micro data is not acknowledged. Creation the privacy requirement more rigorous (e.g., increasing the value of k or l) results in extra imprecision for queries. However the dilemma of enjoyable exactness constriction for entity permissions in a policy/workload has not been considered before. The heuristics proposed in this paper for accuracy-constrained privacy-preserving access control are also significant in the framework of workload-aware anonymization.

Authors and Affiliations

N. Aruna Sandhya Dr. B. Sujatha

Keywords

Related Articles

Image Segmentation Using Stake-Denotes Algorithm

In this paper, we present stake k-mean fragmentation and regions tracking model, which aims at combining color, texture, pattern, and motion features. in the first the stake algorithm segmented the objects which are...

Highly Secured High Throughput Efficient VLSI Architecture for AES Implementations

The AES algorithm can be implemented in different styles at programming levels. The paper compares the hardware efficiency of different AES implementations with respect to their area, speed and power performance espec...

Risk Management in ERP Implementation

“There can be no great accomplishment without risk”, says by the Neil Armstrong. Risk management is very crucial and vital task in the current era of competitive business for any organization, who takes the various ki...

Comparative Study of Fractional Order Derivative Based Image Enhancement Techniques

In this paper, image enhancement based on fractional gradient is proposed. The Taylor’s Series is used to obtain a generalized expression for this Fractional order derivative. The Image is differentiated in both x and...

Improving Performance Among Client-Server For Continuous Distributed Interactive Applications

In today’s situation consumers mainly use the network as an interactive medium for multimedia entertainment and communication purpose. In the entertainment arena, new applications involve multiple users participating...

Download PDF file
  • EP ID EP28246
  • DOI -
  • Views 255
  • Downloads 3

How To Cite

N. Aruna Sandhya Dr. B. Sujatha (2015). A New Heuristic Approach For Hide Valuable Information Of Organizations. International Journal of Research in Computer and Communication Technology, 4(9), -. https://europub.co.uk./articles/-A-28246