Providing Privacy For Sensitive Data In Relational Database With Imprecision Bounds
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 9
Abstract
The perception of privacy-preservation for receptive data can necessitate the enforcement of privacy policies or the fortification against uniqueness revelation by rewarding some privacy requirements. In this paper we inspect privacypreservation from the obscurity aspect. The sensitive information even later than the exclusion of identifying attributes is still disposed to linking attacks by the approved users. This predicament has been considered expansively in the area of micro data publishing and solitude definitions e.g., k-anonymity, l-diversity and variance diversity. Anonymization algorithms use repression and sweeping statement of records to please solitude needs with minimal bend of micro data. The secrecy methods can be used with an access control mechanism to make sure both safety and solitude of the sensitive information. The seclusion is attained at the cost of correctness and vagueness is introduced in the authorized information under an right of entry manage strategy.
Authors and Affiliations
R Pragathi, G Kalyan Chakravarthy
Real Time Embedded Face Recognition using ARM7
Face recognition is a widely used biological recognition technology. In comparison with other identification methods, this type of recognition has direct, friendly and convenient features. The embedded face recogniti...
A Comparative Study of Text Detection Algorithms for Natural Scenes
Text detection from image is highly needed application in current techno world. However, text detection is no longer an unsolved problem as many approaches/algorithms for it are encouraged by researchers. Algorithms...
Comparative analysis of clustering of spatial databases with various DBSCAN Algorithms
Clustering is still an important research issue in the data mining, because there is a continuous research in data mining for optimum clusters on spatial data. There are so many types of partition based and hierarcha...
A Survey: Optimization of Backoff Algorithm for Wireless Mobile Adhoc Network
Media access control (MAC) layer is a very important layer in wireless sensor networks. The media access control data communication protocol sub layer also known as the medium access control. It provide addressing an...
To Implement File based access Control Using Identity-Based Secure distributed Data Storage (IBSDDS)
Privacy is planned to stop unauthorized users from contact the sensitive data as it is topic to illegal disclose and access after being outsourced. Honesty can stop outsourced data from being put back and customized....