Providing Privacy For Sensitive Data In Relational Database With Imprecision Bounds

Abstract

The perception of privacy-preservation for receptive data can necessitate the enforcement of privacy policies or the fortification against uniqueness revelation by rewarding some privacy requirements. In this paper we inspect privacypreservation from the obscurity aspect. The sensitive information even later than the exclusion of identifying attributes is still disposed to linking attacks by the approved users. This predicament has been considered expansively in the area of micro data publishing and solitude definitions e.g., k-anonymity, l-diversity and variance diversity. Anonymization algorithms use repression and sweeping statement of records to please solitude needs with minimal bend of micro data. The secrecy methods can be used with an access control mechanism to make sure both safety and solitude of the sensitive information. The seclusion is attained at the cost of correctness and vagueness is introduced in the authorized information under an right of entry manage strategy.

Authors and Affiliations

R Pragathi, G Kalyan Chakravarthy

Keywords

Related Articles

Real Time Embedded Face Recognition using ARM7

Face recognition is a widely used biological recognition technology. In comparison with other identification methods, this type of recognition has direct, friendly and convenient features. The embedded face recogniti...

A Comparative Study of Text Detection Algorithms for Natural Scenes

Text detection from image is highly needed application in current techno world. However, text detection is no longer an unsolved problem as many approaches/algorithms for it are encouraged by researchers. Algorithms...

Comparative analysis of clustering of spatial databases with various DBSCAN Algorithms

Clustering is still an important research issue in the data mining, because there is a continuous research in data mining for optimum clusters on spatial data. There are so many types of partition based and hierarcha...

A Survey: Optimization of Backoff Algorithm for Wireless Mobile Adhoc Network

Media access control (MAC) layer is a very important layer in wireless sensor networks. The media access control data communication protocol sub layer also known as the medium access control. It provide addressing an...

To Implement File based access Control Using Identity-Based Secure distributed Data Storage (IBSDDS)

Privacy is planned to stop unauthorized users from contact the sensitive data as it is topic to illegal disclose and access after being outsourced. Honesty can stop outsourced data from being put back and customized....

Download PDF file
  • EP ID EP28247
  • DOI -
  • Views 276
  • Downloads 3

How To Cite

R Pragathi, G Kalyan Chakravarthy (2015). Providing Privacy For Sensitive Data In Relational Database With Imprecision Bounds. International Journal of Research in Computer and Communication Technology, 4(9), -. https://europub.co.uk./articles/-A-28247