Call For Paper Volume:7 Issue:11 Nov'2020 |

Cluster Based Access Privilege Management Scheme for Databases

Publication Date : 31/12/2014

Author(s) :

S.Nithya , A.Sathyapriya , G.Karthik.

Volume/Issue :
Volume 1
Issue 6
(12 - 2014)

Abstract :

Knowledge discovery is carried out using the data mining techniques. Association rule mining, classification and clustering operations are carried out under data mining. Clustering method is used to group up the records based on the relevancy. Distance or similarity measures are used to estimate the transaction relationship. Census data and medical data are referred as micro data. Data publish schemes are used to provide private data for analysis. Privacy preservation is used to protect private data values. Anonymity is considered in the privacy preservation process.   Data values are allowed to authorized users using the access control models. Privacy Protection Mechanism (PPM) uses suppression and generalization of relational data to anonymize and satisfy privacy needs. Accuracy-constrained privacy-preserving access control framework is used to manage access control in relational database. The access control policies define selection predicates available to roles while the privacy requirement is to satisfy the k-anonymity or l-diversity. Imprecision bound constraint is assigned for each selection predicate. k-anonymous Partitioning with Imprecision Bounds (k-PIB) is used to estimate accuracy and privacy constraints. Role-based Access Control (RBAC) allows defining permissions on objects based on roles in an organization. Top Down Selection Mondrian (TDSM) algorithm is used for query workload-based anonymization. The Top Down Selection Mondrian (TDSM) algorithm is constructed using greedy heuristics and kd-tree model. Query cuts are selected with minimum bounds in Top-Down Heuristic 1 algorithm (TDH1). The query bounds are updated as the partitions are added to the output in Top-Down Heuristic 2 algorithm (TDH2). The cost of reduced precision in the query results is used in Top-Down Heuristic 3 algorithm (TDH3). Repartitioning algorithm is used to reduce the total imprecision for the queries.   The privacy preserved access privilege management scheme is enhanced to provide incremental mining features. Data insert, delete and update operations are connected with the partition management mechanism. Cell level access control is provided with differential privacy method. Dynamic role management model is integrated with the access control policy mechanism for query predicates.

No. of Downloads :



Web Design MymensinghPremium WordPress ThemesWeb Development

Cluster Based Access Privilege Management Scheme for Databases

December 13, 2014