
Accuracy Constrained PrivacyPreserving Access Control Mechanismfor Relational Data |
ABSTRACT:
Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized user can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization of relational data to anonymize and satisfy privacy requirements, e.g., k-anonymity and l-diversity, against identity and attribute disclosure. However, privacy is achieved at the cost of precision of authorized information. In this paper, we propose an accuracy-constrained privacy-preserving access control framework. The access control policies define selection predicates available to roles while the privacy requirement is to satisfy the k-anonymity or l-diversity. An additional constraint that needs to be satisfied by the PPM is the imprecision bound for each selection predicate. The techniques for workload-aware anonymization for selection predicates have been discussed in the literature. However, to the best of our knowledge, the problem of satisfying the accuracy constraints for multiple roles has not been studied before. In our formulation of the aforementioned problem, we propose heuristics for anonymization algorithms and show empirically that the proposed approach satisfies imprecision bounds for more permissions and has lower total imprecision than the current state of the art.
EXISTING SYSTEM:
The concept of privacy-preservation for sensitive data can require the enforcement of privacy policies or the protection against identity disclosure by satisfying some privacy requirements. Investigate privacy-preservation from the anonymityaspect. The sensitive information, even after the removal of identifying attributes, is still susceptible to linking attacks by the authorized users.
DISADVANTAGES OF EXISTING SYSTEM:
Ø Minimize the imprecision aggregate for all queries .
Ø The imprecision added to each permission/query in the anonymized micro data is not known.
Ø Not satisfying accuracy constraints for individual permissions in a policy/workload.
PROPOSED SYSTEM:
Ø The heuristics proposed in this paper for accuracy constrained privacy-preserving access control are also relevant in the context of workload-aware anonymization.
Ø The framework is a combination of access control and privacy protection mechanisms.
Ø The access control mechanism allows only authorized query predicates on sensitive data.
Ø The privacy preserving module anonymizes the data to meet privacy requirements and imprecision constraints on predicates set by the access control mechanism.
ADVANTAGES OF PROPOSED SYSTEM:
· Formulate the accuracy and privacy constraints.
· Concept of accuracy-constrained privacy-preserving access control for relational data.
· Approximate the solution of the k-PIB problem and conduct empirical evaluation.
SYSTEM SPECIFICATION
Hardware Requirements:
• System : Pentium IV 3.5 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 14’ Colour Monitor.
• Mouse : Optical Mouse.
• Ram : 1 GB.
Software Requirements:
• Operating system : Windows XP or Windows 7, Windows 8.
• Coding Language : Java – AWT,Swings,Networking
• Data Base : My Sql / MS Access.
• Documentation : MS Office
• IDE : Eclipse Galileo
• Development Kit : JDK 1.6
No comments:
Post a Comment