Protected Framework for Securing Sensitive Information from Unauthorized Users

نویسنده

  • EDA Prasanthi
چکیده

The Access control mechanism avoids the unauthorized access of sensitive information. It protects the user information from the unauthorized access. The Protected protection mechanism is a much important concern in the case of sharing the sensitive information. The Protected protection mechanism provides better Protected for the sensitive information which is to be shared. The generally used Protected protection mechanism uses the generalization and suppression of the sensitive data. It prevents the Protected disclosure of the sensitive data. The Protected protection mechanism avoids the identity and attributes disclosure. The Protected is achieved by the high accuracy and consistency of the user information, ie., the precision of the user information. In this paper, it proposes a Protected persevered access control mechanism for relational data. It uses the accuracy constrained Protected preserving access control mechanism for relational data framework here. It uses the concept of imprecision bound for the Protected preserving access control mechanism. The imprecision bound is set for all queries. For the Protected protection mechanism it uses the combination of both the k-anonymity method and fragmentation method. The k-anonymity method uses the suppression and generalization. Here it uses the clustering method for fragmentation. It also proposes the heuristic method for anonymization process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey on Securing Databases From Unauthorized Users

Database and database technologies form a core component of many computing systems and applications which allow data to be stored, retained and shared electronically. As the use of database systems and the amount of data contained in these systems grows continuously and exponentially, database security has become an issue of utmost importance due to an increase in the number of incidents report...

متن کامل

Security Framework Design Intended for Networked Devices

As more organizations and businesses are using computer networks and the Internet, the need for a secure computing environment must also be increased. A secure computing environment must consist of the provisions and policies to prevent and monitor unauthorized access, misuse, modification, and distribution of computing resources. This paper presents a security framework for securing computer n...

متن کامل

Hiding Generalized Association Rules in RDF Databases

One of the important usage of RDF documents is storing semi-structured and structured data for web information systems. But large repositories of data on the web may contain sensitive information that must be protected against unauthorized access. A possible problem, and still not investigated in this documents, is need to balance confidentiality of disclosed data with legitimate needs of the d...

متن کامل

Security Solutions for Pervasive Healthcare

Pervasive healthcare systems use pervasive computing technologies, e.g., wearable medical sensors with wireless interconnects, to increase the modalities and spatiotemporal dimensions in which healthcare services can be provided for improving patient outcomes. Security is very important in pervasive healthcare systems to protect sensitive health information that it collects and manages; therefo...

متن کامل

WebSeA: A Secure Framework for Multi-site Knowledge Representation in Software Engineering

Multi-site software engineering is one of the most extensively used mean of sharing and communicating information of “software projects” to remotely located stake holders. It involves different domains and large number of users. This requires different security measures, to interact and protect relevant data sources. That is why, the issue of securing the data from unauthorized access is very c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015