A New Heuristic Approach For Hide Valuable Information Of Organizations
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 9
Abstract
Organizations accumulate and analyze customer data to pick up their services. Access Control Mechanisms(ACM) is used to make sure that only authorized information is on hand to users. Onthe other hand, sensitive information can at rest be changed by authorized users to conciliation the privacy of consumers. We use the perception of imprecision bound for permission to characterize a porch on the quantity of imprecision that can be tolerated. Existing workload aware anonymization techniques decrease the imprecision combined for all queries and the vagueness added to each permission/query in the anonymized micro data is not acknowledged. Creation the privacy requirement more rigorous (e.g., increasing the value of k or l) results in extra imprecision for queries. However the dilemma of enjoyable exactness constriction for entity permissions in a policy/workload has not been considered before. The heuristics proposed in this paper for accuracy-constrained privacy-preserving access control are also significant in the framework of workload-aware anonymization.
Authors and Affiliations
N. Aruna Sandhya Dr. B. Sujatha
Image Segmentation Using Stake-Denotes Algorithm
In this paper, we present stake k-mean fragmentation and regions tracking model, which aims at combining color, texture, pattern, and motion features. in the first the stake algorithm segmented the objects which are...
Highly Secured High Throughput Efficient VLSI Architecture for AES Implementations
The AES algorithm can be implemented in different styles at programming levels. The paper compares the hardware efficiency of different AES implementations with respect to their area, speed and power performance espec...
Risk Management in ERP Implementation
“There can be no great accomplishment without risk”, says by the Neil Armstrong. Risk management is very crucial and vital task in the current era of competitive business for any organization, who takes the various ki...
Comparative Study of Fractional Order Derivative Based Image Enhancement Techniques
In this paper, image enhancement based on fractional gradient is proposed. The Taylor’s Series is used to obtain a generalized expression for this Fractional order derivative. The Image is differentiated in both x and...
Improving Performance Among Client-Server For Continuous Distributed Interactive Applications
In today’s situation consumers mainly use the network as an interactive medium for multimedia entertainment and communication purpose. In the entertainment arena, new applications involve multiple users participating...