CFP last date
20 December 2024
Reseach Article

A Novel Approach based on Bucketization for Privacy Preserving Access Control Mechanism for Relational Data

by Anuja A. Salunke, A. B. Pawar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 6
Year of Publication: 2018
Authors: Anuja A. Salunke, A. B. Pawar
10.5120/ijca2018917549

Anuja A. Salunke, A. B. Pawar . A Novel Approach based on Bucketization for Privacy Preserving Access Control Mechanism for Relational Data. International Journal of Computer Applications. 182, 6 ( Jul 2018), 15-18. DOI=10.5120/ijca2018917549

@article{ 10.5120/ijca2018917549,
author = { Anuja A. Salunke, A. B. Pawar },
title = { A Novel Approach based on Bucketization for Privacy Preserving Access Control Mechanism for Relational Data },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2018 },
volume = { 182 },
number = { 6 },
month = { Jul },
year = { 2018 },
issn = { 0975-8887 },
pages = { 15-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number6/29765-2018917549/ },
doi = { 10.5120/ijca2018917549 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:10:33.519564+05:30
%A Anuja A. Salunke
%A A. B. Pawar
%T A Novel Approach based on Bucketization for Privacy Preserving Access Control Mechanism for Relational Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 6
%P 15-18
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the todays world of digitalization of data, giving proper access of data to the users is a crucial part. Access control mechanisms are use to protect sensitive information from unauthorized users. Still there is chance of compromising the privacy of the person by authorized user which may lead to identity disclosure. In this paper we proposed a efficient method called bucketization to preserve the privacy of the user. To anonymize and satisfy privacy requirements PPM uses suppression and generalization of relational data like k-anonymity and l-diversity, against identity and attribute disclosure. However, privacy is achieved at the cost of precision of authorized information. The proposed system is implemented and compared with the state of art techniques studied in literature survey.

References
  1. K. LeFevre, D. DeWitt, and R. Ramakrishnan, “Workload-Aware Anonymization Techniques for Large-Scale Datasets,” ACM Trans. Database Systems, vol. 33, no. 3, pp. 1-47, 2008.
  2. T. Iwuchukwu and J. Naughton, “K-Anonymization as Spatial Indexing: Toward Scalable and Incremental Anonymization,” Proc. 33rd Int’l Conf. Very Large Data Bases, pp. 746-757, 2007.
  3. B. Fung, K. Wang, R. Chen, and P. Yu, “Privacy-Preserving Data Publishing: A Survey of Recent Developments,” ACM Computing Surveys, vol. 42, no. 4, article 14, 2010
  4. P.G. Griffiths and B. Wade, “An Authorization Mechanism for a Relational Database,” ACM Trans. Database Systems, vol. 1, no. 3, pp. 242-255, 1976.
  5. R. Fagin, “On an Authorization Mechanism,” ACM Trans. Database Systems, vol. 3, no. 3, pp. 310-319, 1978.
  6. E. Bertino, S. Jajodia, and P. Samarati, “An Extended Authorization Model,” IEEE Trans. Knowledge and Data Eng.,vol. 9, no. 1, pp. 85-101, 1997
  7. R. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, “Role-Based Access Control Models,”Computer,vol. 29, no. 2, pp. 38-47, 1996
  8. E. Bertino, C. Bettini, E. Ferrari, and P. Samarati, “An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning,”ACM Trans. Database Systems,vol. 23, no. 3, pp. 231-285, 1998.
  9. A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubrama- niam, L-Diversity: Privacy Beyond k-anonymity, ACM Trans. Knowledge Discovery from Data, vol. 1, no. 1, article 3, 2007.
  10. T. Iwuchukwu and J. Naughton, K-Anonymization as Spatial Indexing: Toward Scalable and Incremental Anonymization, Proc. 33rd Intl Conf. Very Large Data Bases, pp. 746-757, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Access control privacy k-anonymity query evaluation