Access Control And Privacy Preserving Mechanisms On Sensitive Data

Abstract

The privacy preserving module anonymizes the data to convene privacy requirements and sketchiness constraints on predicates set by the access control device. We make this communication as the problem of k-anonymous. Role-based Access Control (RBAC) agrees to significant permissions on objects based on roles in an organization. An RBAC policy configuration is composed of a set of Users(U), a set of Roles (R), and a set of Permissions (P). The access control policies explain selection predicates accessible to roles at the same time as the privacy compulsion is to please the k-anonymity orl-diversity.

Authors and Affiliations

I. Ashok kumar, Y. Swathi, Y. Jnapika

Keywords

Related Articles

Optimize Energy Consumption with priority forwarder list in Wireless Sensor Networks

Opportunistic routing always useful to increase the network throughput by forwarding the packets to the nodes which are nearer to the destination node. These nodes are called as forwarder listed nodes during the tran...

An Approach for Providing Privacy of Microdata Publishing

In recent years, the wide accessibility of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed for privacy preserving data mining of...

(NCECD) A Novel Data Distribution Scheme for VoD Services in P2P Networks

Anonymizing networks such as Tor allow users to access internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks However has been limited b...

A Novel Technique For Efficient Data Access In MDTN

It is pleasing to offer differentiated access services such thatdata access policies are distinct over user attributes or roles,which are direct by the key authorities. We propose a securedata recovery scheme using C...

Design of Dadda Algorithm based Floating Point Multiplier

In this paper area efficient floating point multiplier is developed using Dadda Algorithm . For improving the speed of mantissa multiplication Dadda multiplier is used by replacing Carry Save Multiplier. The use of pr...

Download PDF file
  • EP ID EP28385
  • DOI -
  • Views 318
  • Downloads 6

How To Cite

I. Ashok kumar, Y. Swathi, Y. Jnapika (2016). Access Control And Privacy Preserving Mechanisms On Sensitive Data. International Journal of Research in Computer and Communication Technology, 5(2), -. https://europub.co.uk./articles/-A-28385