SlideShare a Scribd company logo
1 of 5
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Accuracy-Constrained Privacy-Preserving Access Control 
Mechanism for Relational Data 
ABSTRACT: 
Access control mechanisms protect sensitive information from unauthorized users. 
However, when sensitive information is shared and a Privacy Protection 
Mechanism (PPM) is not in place, an authorized user can still compromise the 
privacy of a person leading to identity disclosure. A PPM can use suppression and 
generalization of relational data to anonymize and satisfy privacy requirements, 
e.g., k-anonymity and l-diversity, against identity and attribute disclosure. 
However, privacy is achieved at the cost of precision of authorized information. In 
this paper, we propose an accuracy-constrained privacy-preserving access control 
framework. The access control policies define selection predicates available to 
roles while the privacy requirement is to satisfy the k-anonymity or l-diversity. An 
additional constraint that needs to be satisfied by the PPM is the imprecision bound 
for each selection predicate. The techniques for workload-aware anonymization for 
selection predicates have been discussed in the literature. However, to the best of 
our knowledge, the problem of satisfying the accuracy constraints for multiple 
roles has not been studied before. In our formulation of the aforementioned
problem, we propose heuristics for anonymization algorithms and show 
empirically that the proposed approach satisfies imprecision bounds for more 
permissions and has lower total imprecision than the current state of the art. 
EXISTING SYSTEM: 
The concept of privacy-preservation for sensitive data can require the enforcement 
of privacy policies or the protection against identity disclosure by satisfying some 
privacy requirements. Investigate privacy-preservation from the anonymityaspect. 
The sensitive information, even after the removal of identifying attributes, is still 
susceptible to linking attacks by the authorized users. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Minimize the imprecision aggregate for all queries . 
 The imprecision added to each permission/query in the anonymized micro 
data is not known. 
 Not satisfying accuracy constraints for individual permissions in a 
policy/workload. 
PROPOSED SYSTEM: 
 The heuristics proposed in this paper for accuracy constrained privacy-preserving 
access control are also relevant in the context of workload-aware 
anonymization.
 The framework is a combination of access control and privacy protection 
mechanisms. 
 The access control mechanism allows only authorized query predicates on 
sensitive data. 
 The privacy preserving module anonymizes the data to meet privacy 
requirements and imprecision constraints on predicates set by the access 
control mechanism. 
ADVANTAGES OF PROPOSED SYSTEM: 
 Formulate the accuracy and privacy constraints. 
 Concept of accuracy-constrained privacy-preserving access control for 
relational data. 
 Approximate the solution of the k-PIB problem and conduct empirical 
evaluation. 
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL
REFERENCE: 
Zahid Pervaiz, Walid G. Aref, Senior Member, Arif Ghafoor, Fellow, and 
Nagabhushana Prabhu,“Accuracy-Constrained Privacy-Preserving Access 
Control Mechanism for Relational Data”, IEEE TRANSACTIONS, VOL. 26, 
NO. 4, APRIL 2014.

More Related Content

More from IEEEMEMTECHSTUDENTSPROJECTS

2014 IEEE DOTNET DATA MINING PROJECT Mining statistically significant co loca...
2014 IEEE DOTNET DATA MINING PROJECT Mining statistically significant co loca...2014 IEEE DOTNET DATA MINING PROJECT Mining statistically significant co loca...
2014 IEEE DOTNET DATA MINING PROJECT Mining statistically significant co loca...IEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE DOTNET DATA MINING PROJECT Lars an-efficient-and-scalable-location-...
2014 IEEE DOTNET DATA MINING PROJECT Lars an-efficient-and-scalable-location-...2014 IEEE DOTNET DATA MINING PROJECT Lars an-efficient-and-scalable-location-...
2014 IEEE DOTNET DATA MINING PROJECT Lars an-efficient-and-scalable-location-...IEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data
2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data
2014 IEEE DOTNET DATA MINING PROJECT Data mining with big dataIEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE DOTNET DATA MINING PROJECT Converged architecture for broadcast and...
2014 IEEE DOTNET DATA MINING PROJECT Converged architecture for broadcast and...2014 IEEE DOTNET DATA MINING PROJECT Converged architecture for broadcast and...
2014 IEEE DOTNET DATA MINING PROJECT Converged architecture for broadcast and...IEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE DOTNET DATA MINING PROJECT Anonymous query processing in road networks
2014 IEEE DOTNET DATA MINING PROJECT Anonymous query processing in road networks2014 IEEE DOTNET DATA MINING PROJECT Anonymous query processing in road networks
2014 IEEE DOTNET DATA MINING PROJECT Anonymous query processing in road networksIEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE DOTNET DATA MINING PROJECT Ai and opinion mining
2014 IEEE DOTNET DATA MINING PROJECT Ai and opinion mining2014 IEEE DOTNET DATA MINING PROJECT Ai and opinion mining
2014 IEEE DOTNET DATA MINING PROJECT Ai and opinion miningIEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE DOTNET DATA MINING PROJECT A probabilistic approach to string trans...
2014 IEEE DOTNET DATA MINING PROJECT A probabilistic approach to string trans...2014 IEEE DOTNET DATA MINING PROJECT A probabilistic approach to string trans...
2014 IEEE DOTNET DATA MINING PROJECT A probabilistic approach to string trans...IEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE DOTNET DATA MINING PROJECT A novel model for mining association rul...
2014 IEEE DOTNET DATA MINING PROJECT A novel model for mining association rul...2014 IEEE DOTNET DATA MINING PROJECT A novel model for mining association rul...
2014 IEEE DOTNET DATA MINING PROJECT A novel model for mining association rul...IEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Xs path navigation on xml schemas made easy
2014 IEEE JAVA DATA MINING PROJECT Xs path navigation on xml schemas made easy2014 IEEE JAVA DATA MINING PROJECT Xs path navigation on xml schemas made easy
2014 IEEE JAVA DATA MINING PROJECT Xs path navigation on xml schemas made easyIEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Web image re ranking using query-specific ...
2014 IEEE JAVA DATA MINING PROJECT Web image re ranking using query-specific ...2014 IEEE JAVA DATA MINING PROJECT Web image re ranking using query-specific ...
2014 IEEE JAVA DATA MINING PROJECT Web image re ranking using query-specific ...IEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Shortest path computing in relational dbms
2014 IEEE JAVA DATA MINING PROJECT Shortest path computing in relational dbms2014 IEEE JAVA DATA MINING PROJECT Shortest path computing in relational dbms
2014 IEEE JAVA DATA MINING PROJECT Shortest path computing in relational dbmsIEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...IEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signaturesIEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...IEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Searching dimension incomplete databases
2014 IEEE JAVA DATA MINING PROJECT Searching dimension incomplete databases2014 IEEE JAVA DATA MINING PROJECT Searching dimension incomplete databases
2014 IEEE JAVA DATA MINING PROJECT Searching dimension incomplete databasesIEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...IEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Multi comm finding community structure in ...
2014 IEEE JAVA DATA MINING PROJECT Multi comm finding community structure in ...2014 IEEE JAVA DATA MINING PROJECT Multi comm finding community structure in ...
2014 IEEE JAVA DATA MINING PROJECT Multi comm finding community structure in ...IEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishing
2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishing2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishing
2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishingIEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...IEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Mining statistically significant co locati...
2014 IEEE JAVA DATA MINING PROJECT Mining statistically significant co locati...2014 IEEE JAVA DATA MINING PROJECT Mining statistically significant co locati...
2014 IEEE JAVA DATA MINING PROJECT Mining statistically significant co locati...IEEEMEMTECHSTUDENTSPROJECTS
 

More from IEEEMEMTECHSTUDENTSPROJECTS (20)

2014 IEEE DOTNET DATA MINING PROJECT Mining statistically significant co loca...
2014 IEEE DOTNET DATA MINING PROJECT Mining statistically significant co loca...2014 IEEE DOTNET DATA MINING PROJECT Mining statistically significant co loca...
2014 IEEE DOTNET DATA MINING PROJECT Mining statistically significant co loca...
 
2014 IEEE DOTNET DATA MINING PROJECT Lars an-efficient-and-scalable-location-...
2014 IEEE DOTNET DATA MINING PROJECT Lars an-efficient-and-scalable-location-...2014 IEEE DOTNET DATA MINING PROJECT Lars an-efficient-and-scalable-location-...
2014 IEEE DOTNET DATA MINING PROJECT Lars an-efficient-and-scalable-location-...
 
2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data
2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data
2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data
 
2014 IEEE DOTNET DATA MINING PROJECT Converged architecture for broadcast and...
2014 IEEE DOTNET DATA MINING PROJECT Converged architecture for broadcast and...2014 IEEE DOTNET DATA MINING PROJECT Converged architecture for broadcast and...
2014 IEEE DOTNET DATA MINING PROJECT Converged architecture for broadcast and...
 
2014 IEEE DOTNET DATA MINING PROJECT Anonymous query processing in road networks
2014 IEEE DOTNET DATA MINING PROJECT Anonymous query processing in road networks2014 IEEE DOTNET DATA MINING PROJECT Anonymous query processing in road networks
2014 IEEE DOTNET DATA MINING PROJECT Anonymous query processing in road networks
 
2014 IEEE DOTNET DATA MINING PROJECT Ai and opinion mining
2014 IEEE DOTNET DATA MINING PROJECT Ai and opinion mining2014 IEEE DOTNET DATA MINING PROJECT Ai and opinion mining
2014 IEEE DOTNET DATA MINING PROJECT Ai and opinion mining
 
2014 IEEE DOTNET DATA MINING PROJECT A probabilistic approach to string trans...
2014 IEEE DOTNET DATA MINING PROJECT A probabilistic approach to string trans...2014 IEEE DOTNET DATA MINING PROJECT A probabilistic approach to string trans...
2014 IEEE DOTNET DATA MINING PROJECT A probabilistic approach to string trans...
 
2014 IEEE DOTNET DATA MINING PROJECT A novel model for mining association rul...
2014 IEEE DOTNET DATA MINING PROJECT A novel model for mining association rul...2014 IEEE DOTNET DATA MINING PROJECT A novel model for mining association rul...
2014 IEEE DOTNET DATA MINING PROJECT A novel model for mining association rul...
 
2014 IEEE JAVA DATA MINING PROJECT Xs path navigation on xml schemas made easy
2014 IEEE JAVA DATA MINING PROJECT Xs path navigation on xml schemas made easy2014 IEEE JAVA DATA MINING PROJECT Xs path navigation on xml schemas made easy
2014 IEEE JAVA DATA MINING PROJECT Xs path navigation on xml schemas made easy
 
2014 IEEE JAVA DATA MINING PROJECT Web image re ranking using query-specific ...
2014 IEEE JAVA DATA MINING PROJECT Web image re ranking using query-specific ...2014 IEEE JAVA DATA MINING PROJECT Web image re ranking using query-specific ...
2014 IEEE JAVA DATA MINING PROJECT Web image re ranking using query-specific ...
 
2014 IEEE JAVA DATA MINING PROJECT Shortest path computing in relational dbms
2014 IEEE JAVA DATA MINING PROJECT Shortest path computing in relational dbms2014 IEEE JAVA DATA MINING PROJECT Shortest path computing in relational dbms
2014 IEEE JAVA DATA MINING PROJECT Shortest path computing in relational dbms
 
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...
 
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
 
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
 
2014 IEEE JAVA DATA MINING PROJECT Searching dimension incomplete databases
2014 IEEE JAVA DATA MINING PROJECT Searching dimension incomplete databases2014 IEEE JAVA DATA MINING PROJECT Searching dimension incomplete databases
2014 IEEE JAVA DATA MINING PROJECT Searching dimension incomplete databases
 
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
 
2014 IEEE JAVA DATA MINING PROJECT Multi comm finding community structure in ...
2014 IEEE JAVA DATA MINING PROJECT Multi comm finding community structure in ...2014 IEEE JAVA DATA MINING PROJECT Multi comm finding community structure in ...
2014 IEEE JAVA DATA MINING PROJECT Multi comm finding community structure in ...
 
2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishing
2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishing2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishing
2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishing
 
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
 
2014 IEEE JAVA DATA MINING PROJECT Mining statistically significant co locati...
2014 IEEE JAVA DATA MINING PROJECT Mining statistically significant co locati...2014 IEEE JAVA DATA MINING PROJECT Mining statistically significant co locati...
2014 IEEE JAVA DATA MINING PROJECT Mining statistically significant co locati...
 

Recently uploaded

Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 

Recently uploaded (20)

Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 

2014 IEEE JAVA DATA MINING PROJECT Accuracy constrained privacy-preserving access control mechanism for relational data

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data ABSTRACT: Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized user can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization of relational data to anonymize and satisfy privacy requirements, e.g., k-anonymity and l-diversity, against identity and attribute disclosure. However, privacy is achieved at the cost of precision of authorized information. In this paper, we propose an accuracy-constrained privacy-preserving access control framework. The access control policies define selection predicates available to roles while the privacy requirement is to satisfy the k-anonymity or l-diversity. An additional constraint that needs to be satisfied by the PPM is the imprecision bound for each selection predicate. The techniques for workload-aware anonymization for selection predicates have been discussed in the literature. However, to the best of our knowledge, the problem of satisfying the accuracy constraints for multiple roles has not been studied before. In our formulation of the aforementioned
  • 2. problem, we propose heuristics for anonymization algorithms and show empirically that the proposed approach satisfies imprecision bounds for more permissions and has lower total imprecision than the current state of the art. EXISTING SYSTEM: The concept of privacy-preservation for sensitive data can require the enforcement of privacy policies or the protection against identity disclosure by satisfying some privacy requirements. Investigate privacy-preservation from the anonymityaspect. The sensitive information, even after the removal of identifying attributes, is still susceptible to linking attacks by the authorized users. DISADVANTAGES OF EXISTING SYSTEM:  Minimize the imprecision aggregate for all queries .  The imprecision added to each permission/query in the anonymized micro data is not known.  Not satisfying accuracy constraints for individual permissions in a policy/workload. PROPOSED SYSTEM:  The heuristics proposed in this paper for accuracy constrained privacy-preserving access control are also relevant in the context of workload-aware anonymization.
  • 3.  The framework is a combination of access control and privacy protection mechanisms.  The access control mechanism allows only authorized query predicates on sensitive data.  The privacy preserving module anonymizes the data to meet privacy requirements and imprecision constraints on predicates set by the access control mechanism. ADVANTAGES OF PROPOSED SYSTEM:  Formulate the accuracy and privacy constraints.  Concept of accuracy-constrained privacy-preserving access control for relational data.  Approximate the solution of the k-PIB problem and conduct empirical evaluation. SYSTEM ARCHITECTURE:
  • 4. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL
  • 5. REFERENCE: Zahid Pervaiz, Walid G. Aref, Senior Member, Arif Ghafoor, Fellow, and Nagabhushana Prabhu,“Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data”, IEEE TRANSACTIONS, VOL. 26, NO. 4, APRIL 2014.