Protected Framework for Securing Sensitive Information from Unauthorized Users
نویسنده
چکیده
The Access control mechanism avoids the unauthorized access of sensitive information. It protects the user information from the unauthorized access. The Protected protection mechanism is a much important concern in the case of sharing the sensitive information. The Protected protection mechanism provides better Protected for the sensitive information which is to be shared. The generally used Protected protection mechanism uses the generalization and suppression of the sensitive data. It prevents the Protected disclosure of the sensitive data. The Protected protection mechanism avoids the identity and attributes disclosure. The Protected is achieved by the high accuracy and consistency of the user information, ie., the precision of the user information. In this paper, it proposes a Protected persevered access control mechanism for relational data. It uses the accuracy constrained Protected preserving access control mechanism for relational data framework here. It uses the concept of imprecision bound for the Protected preserving access control mechanism. The imprecision bound is set for all queries. For the Protected protection mechanism it uses the combination of both the k-anonymity method and fragmentation method. The k-anonymity method uses the suppression and generalization. Here it uses the clustering method for fragmentation. It also proposes the heuristic method for anonymization process.
منابع مشابه
A Survey on Securing Databases From Unauthorized Users
Database and database technologies form a core component of many computing systems and applications which allow data to be stored, retained and shared electronically. As the use of database systems and the amount of data contained in these systems grows continuously and exponentially, database security has become an issue of utmost importance due to an increase in the number of incidents report...
متن کاملSecurity Framework Design Intended for Networked Devices
As more organizations and businesses are using computer networks and the Internet, the need for a secure computing environment must also be increased. A secure computing environment must consist of the provisions and policies to prevent and monitor unauthorized access, misuse, modification, and distribution of computing resources. This paper presents a security framework for securing computer n...
متن کاملHiding Generalized Association Rules in RDF Databases
One of the important usage of RDF documents is storing semi-structured and structured data for web information systems. But large repositories of data on the web may contain sensitive information that must be protected against unauthorized access. A possible problem, and still not investigated in this documents, is need to balance confidentiality of disclosed data with legitimate needs of the d...
متن کاملSecurity Solutions for Pervasive Healthcare
Pervasive healthcare systems use pervasive computing technologies, e.g., wearable medical sensors with wireless interconnects, to increase the modalities and spatiotemporal dimensions in which healthcare services can be provided for improving patient outcomes. Security is very important in pervasive healthcare systems to protect sensitive health information that it collects and manages; therefo...
متن کاملWebSeA: A Secure Framework for Multi-site Knowledge Representation in Software Engineering
Multi-site software engineering is one of the most extensively used mean of sharing and communicating information of “software projects” to remotely located stake holders. It involves different domains and large number of users. This requires different security measures, to interact and protect relevant data sources. That is why, the issue of securing the data from unauthorized access is very c...
متن کامل