SlideShare a Scribd company logo
1 of 5
Download to read offline
Mr Rakesh Ramesh Tannu. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -1) July 2016, pp.54-58
www.ijera.com 54 | P a g e
The Constrained Method of Accessibility and Privacy Preserving
Of Relational Database
Mr Rakesh Ramesh Tannu*, Prof. Sandip A. Kahate**
*(Second Year Master of Engineering, Department of Computer Engineering, SPCOE, Dumbarwadi, Otur, Tal-
Junnar, Dist-Pune, Maharashtra, India)
** (Assistant Professor, Department of Computer Engineering, SPCOE, Dumbarwadi, Otur, Tal-Junnar, Dist-
Pune, Maharashtra, India)
ABSTRACT
Now in organizations or companies maximum information or data available and that data are related to tabular
form means relational database. Sometimes organization wanted to distribute that particular information or data
in within organization or other organization in daily basis. Here the thing is that the organization faces the some
kind of problems of security related because they distributed that information for its purposes and here
sometimes organization wanted that particular information will be modified or upgraded, Now they can used
numbers of methods or technics for encryption and electronic signatures for given a security and protection of
that particular data in during transmission network. In that protection of that protection used various different
mechanisms and strong methods for accessing that specific that particular data or information. It is very well
known that current or today the proper data must take as access control polices. Also some kind of methods for
CIA towards database system must be adopted.
Keywords: Privacy Preserving Mechanism, Access Control Mechanism, Access Control, k-anonymity,
Relational Database.
I. INTRODUCTION
Organizations often stored and collect
consumer data or information for improved the
maximum their services. Access Control
Mechanisms (ACM) gives a surely used that only
authenticated or authorized and proper data available
to users. Whenever the sensitive or private data may
be wrong used or sometimes misused by authorized
users to manage the privacy of consumers. Now the
privacy-preservation is to used for control policies or
methods on sensitive data that protection against
identity disclosure by using some kind of privacy
requirements.
Now the private or sensitive information or
data, also they can be removed of identifying
attributes very easily linked attacks by the
authorized or legal persons .The suppression and
generalization of records to satisfy privacy
requirements by using Anonymization algorithm
with minimum distortion of micro or small data. The
both security and protection on private or sensitive
information used the particular Anonymity methods
guarantee to us. Now a privacy achieved that of
accuracy and imprecision are introduced in accurate
or proper and authorized information under the
control policy and some kind of methods.
II. LITERATURE SURVEY
Now in current time in various
organizations those arrival data or information is a
various format and increasingly size continuously in
network. Sometimes the different organizations are
now shifting their transactions and shopping and
also their infrastructure through a web since end
users. So everyone interacting to the world wide web
and taking wanted his needs, due to this a large that
is huge data comes at host in a network. The
literature survey is an important part in this paper
because its introduces past work or its regarding
some functions of different authors which helpful
while the whole paper.
Elisa Bertino et all [1] give us a perfect
solution on data security and protection used
following three points: To give a security on private
or sensitive information or data against unauthorized
disclosure, integrity is the prevention of
unauthorized and not properly or correctly data
modification and availability is prevention recovery
from the hardware and software problems and other
regarding from malicious data access denials make
the database system unavailable.
Pierangela Samarati et all [2] has been
defines or explains that the currently in Networking
mostly demand that broadcasting and shearing the
information/ data, Sometimes in past conditions
released or distributed the particular information was
many times in tabular and statistical format max
conditions call the information on today release in
particular small or micro data. To provide the
protection or security on anonymity of the entities
called as respondents that particular information or
data refers, Now the data holders often remove or
encrypting explicit identifiers like names, addresses
RESEARCH ARTICLE OPEN ACCESS
Mr Rakesh Ramesh Tannu. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -1) July 2016, pp.54-58
www.ijera.com 55 | P a g e
and phone numbers. Deidentifying data/information,
However gives not guarantee of anonymity released
or drop particular information often conditions
another data like race, birthdate, sex and ZIP code
that specific information or data to publicly available
to reindentify respondents and inferring information
or data was not intended for disclosure. They
address problems or sometimes issues of drop or
releasing micro data while safeguarding the
anonymity of that the respondents to which the
process of k-anonymity. A table providing k-
anonymity if attempts to link explicitly
finding/identified information or data to that its
content map that information/data to minimum k-
entites.
Ashwin Machanavajjhala et all [3] had been
explain about two normal attacks or simple attacks
that k anonymized data or information collection has
some or minimum subtle but severe privacy or
protection related problems are occurred. First, the
attacker may be find the values of private or
sensitive attributes/properties, that is a specific
problem. Second, attackers often have background
knowledge, and show that k-anonymity does not
have guarantee against attackers using background
knowledge. Now to provide a exactly analysis of
these two attacks, and a novel and strong privacy
criterion called l-diversity that can defend against
like attacks.
Alexander Brodsky et all [4] defines or
explains complex/sophisticated conditions/situations
of inference channels that activated while database
constraints are combined/together with non
private/sensitive information to obtained that the
particular private or sensitive information. Now here
present an integrity security mechanism, called as
the Disclosure Monitor, which guaranteed or
confirm data private/sensitive or confidentiality by
extending the standard must access control
mechanism with a Disclosure Inference Engine. That
particular Engines provides and gives us that all the
data/information that is disclosed to a user based on
the user's past and present queries and the mata data
and database constraints, Now the particular engine
are operated in two modes: data dependent mode
when disclosure is established based on the real data
values and data independent mode while only
queries are utilizing to generated the disclosed
data/information, that the particular disclosure
interference algorithms are two modes to
characterize by the properties of soundness (i.e.
everything are is make by the algorithm) The
technical base or core focus on the establishment of
sound and complete that algorithms on both data
dependent and data independent disclosures.
III. SYSTEM ARCHITECTURE
3.1 Existing System
 The privacy-preservation is that the particular
protection/security on identity disclosure used
some other kind of requirements.
 The private or sensitive information, after
cancellation of identifying attributes, are untill
get easily to link attacks by authorized/ legal
users.
 Suppression & generalization of relational data
used by PPM.
3.2 Limitation of Existing System
 To users no privacy used.
 All queries regarding aggregate imprecision is
very lass or minimum.
 Micro data/small data sometimes are not known.
 To individual/single person, this method not
good.
3.3 Proposed System
 PPM & ACM are used strongly for Relational
database.
 Proper Formulation the accuracy and privacy
constraints.
 All problems evaluation used the Heuristics
process.
Now the PPM gives us the confirmation for
the privacy and accuracy targets are met but firstly
the private/sensitive data present. The selected
predicates of QI attributes through the permission of
access control policy or method. The imprecision
bound for each and every permission query defined
by the administrator policy, role-to-permission
assignments and user-to-role assignments. The
authorized data/information has been on desired
level of the accuracy by the surely the function of
the imprecision bound.
To users not shared/passed the imprecision
bound data or information because knowing the
imprecision bound in result in violating the
particular privacy/sensitive requirements. The
imprecision bound for each and every permission
with PPM is wanted to meet privacy requirements.
After the anonymization the particular proper
tuples/records values in relation are replaced with
the generalized values. In that cases, the access
control enforcement over the generalization
data/information need the properly explained, Now
here two point discussed that Relaxed and Strict
access control enforcement mechanisms over
anonymized data/information. The access control
enforcement by reference monitor are available two
type as follows.
 To permission that the all partitions that are
overlapped permissions.
Mr Rakesh Ramesh Tannu. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -1) July 2016, pp.54-58
www.ijera.com 56 | P a g e
 To permission that only particular partitions that
is fully enclosed permission.
Fig. 1: Proposed Architecture
IV. IMPLEMENTATION DETAILS
Here completing all the process than used
following two algorithms.
 TDH-(Top Down Heuristic Algorithm)
 TDH-1(Top Down Heuristic Algorithm 1)
 ECC-(Elliptic Curve Cryptography)
4.1 Algorithm: Top-Down Heuristic Algorithm
The TDH algorithm is mostly used the
greedy and proper heuristics partitioning that divided
list at median, Sometimes if the median again falls
inside the specific query than again the splitting the
specific partitions and when overlapped query still
not occurred so the imprecision related query cannot
change as both the new partitions. Now splitting the
partition along the query cut and then selected the
dimension/size at least along which the imprecision
is for all that queries.
It works under the following stages
Input: T, K, Q, and BQj
Output: P
1 Initialize Set of Candidate Partitions(CPT)
2 for (CPi Ԑ CP ) do
3 Find the set of quries QO that overlap CPi
such that ic Qo
j and icCPi > 0
4 Sort queries QO in increasing order of BQj
5 while(Feasible cut is not found) do
6 Select query from QO
7 Create query cuts in each dimension
8 Select dimension and cut having least
overall imprecision for all queries in Q
9 if (Feasible cut found) then
10 Create new partition and add to CP
11 else
12 Split CPi recursively along median till
anonymity requirement satisfied
13 Compact new partition and add to P
14 return (P)
4.2 Algorithm: Top-Down Heuristic Algorithm 1
Now the particular partition is divided
through a logical database and its regarding
constituent elements in distinct independent
parts.The particular Database partition
MPA(manageability, performance and availability)
that particular reasons are used. The comparison
between the query bound and query imprecision
through the definition o the query imprecision.This
Algorithm is used for repartitioning procedures .
It works under the following stages
Input: T,K,Q, and BQj
Output: P
1 Initialize Set of Candidate Partitions(CPT )
2 for (CPi Ԑ CP ) do
//Depth-First (preorder) traversal
3 Find the set of quries QO that overlap CPi
such that icQo
j and icCPi > 0
4 Sort quires QO in increasing order of BQj
5 Select query from QO with smallest BQj
6 Create query cuts in each dimension
7 Reject cuts with skewed partitions
8 Select dimension and cut having least overall
imprecision for all queries in Q
9 while(Feasible cut is not found) do
10 Select query from QO
11 Create query cuts in each dimension
12 Select dimension and cut having least overall
imprecision for all queries in Q
13 if(Feasible cut found) then
14 Create new partitions and add to CPi
15 else
16 Split CPi recursively along median till
anonymity requirement satisfied
17 Compact new partitions and add to P
18 Update BQj according to icQj
and icPi , ^ Qj Ԑ Q
19 return(P)
4.3 Algorithm: Elliptic Curve Cryptography
Algorithm
This Algorithm is used for strong
Authentication, Security and Protection. Its used to
construct the Public Key Cryptography System. Its
used many times public key (Asymmetric) but here
instead of Asymmetric key used Random key for
Sender and Receiver for performing accordingly
Encryption and Decryption
Mr Rakesh Ramesh Tannu. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -1) July 2016, pp.54-58
www.ijera.com 57 | P a g e
V. EXPERIMENTAL RESULT
The purposes of the experimental
calculations are to check the impact of before and
after partitions of table through tulpe wised.
Table 1 Sensitive
ID AGE ZIP CODE DISEASE
1 17 22 FLU
2 26 32 FEVER
3 32 42 DIARREA
4 37 32 FLU
5 20 22 FEVER
6 40 42 DIARREA
Table 2 Anonymous
ID AGE ZIP CODE DISEASE
1 0-20 10-30 FLU
2 0-20 10-30 FEVER
3 20-30 10-30 DIARREA
4 20-30 30-40 FLU
5 30-40 30-40 FEVER
6 30-40 30-40 DIARREA
Table 3 Partition Accuracy Id Variations
ID
Before Partition
Selection
After Partition
Selection
10 50% 60%
50 60% 70%
100 70% 80%
Fig 1: Partition Accuracy ID Variations
Fig 2: Partition Accuracy ID Variations
Where 1:- AGE
2:- ZIP
3:- DISEASE
VI. CONCLUSION AND FUTURE SCOPE
The ACM and PPM are together through
the framework, The ACM gives the permissions
only proper/authorized query predicates on private
information. The PPM anonymizes to meet the
sensitive requirements and the ACM are set to
predicate imprecision constraints. Now due to above
all predicates regarding terms the better security
methods or technics when accessing and sharing
large organizational crucial relational dataset.
ACKNOWLEDGMENT
I would like to thanks to my project guide
Prof. Sandip Kahate they have been given me proper
guidance for writing this paper.
REFERENCES
[1]. Elisa Bertino, Fellow, IEEE, and Ravi
Sandhu, Fellow, IEEE, “Database Security
Concepts, Approaches, and Challenges,”
IEEE Transactions On Dependable And
Secure Computing, Vol. 2, No. 1, January-
March 2005.
[2]. Pierangela Samarati, “Database Security
Concepts, Approaches, and Challenges,”
IEEE Transactions on Knowledge And
Data Engineering,Vol.13,No. 6,
November/December 2001. Grants” WASE
International Conference on Information
Engineering.
[3]. Ashwin Machanavajjhala, Daniel Kifer,
Johannes Gehrke, and Muthuramakrishnan
Venkit Asubramaniam, “Diversity: Privacy
Beyond k-Anonymity,” IEEE Transactions
on Industrial Electronics, Vol. 59, No. 1,
January 2012.
[4]. S. Chaudhuri, T. Dutta, and S. Sudarshan,
“Fine Grained Authorization through
Predicated Grants,” IEEE Transactions On
Mr Rakesh Ramesh Tannu. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -1) July 2016, pp.54-58
www.ijera.com 58 | P a g e
Dependable And Secure Computing, Vol.
2, No. 1, January-March 2012.
[5]. A Standard for Role-Based Access
Control” IEEE Transactions on Industrial
Informatics, Vol. 9, No. 1, Feb 2013.
[6]. A. Meyerson and R. Williams, “The
Complexity of Optimal k-Anonymity,”
IEEE 13th International Conference on
Trust, Security and Privacy in Computing
and Communications.
[7]. G. Aggarwal, T. Feder, K. Kenthapadi, R.
Motwani, R. Panigrahy, D. Thomas,and A.
Zhu, “Approximation Algorithms for k-
Anonymity computers and security,” IEEE
Transactions On Dependable And Secure
Computing, Vol. 1, No. 1, January-March
2013.
[8]. Li Liu,Murat Kantarcioglu and Bhavani
Thuraisingham “Privacy Preserving
Decision Tree Mining from Perturbed
Data” International Conference on System
Sciences, 2009.
[9]. Rezwan Ahmed, George Karypis
“Algorithms for Mining the Evolution of
Conserved Relational States in Dynamic
Networks” IEEE International conference
on Big Data, 2014.
[10]. K. Browder and M.Davidson, “The Virtual
Private Database in oracle9ir2” Oracle
Technical White Paper ,vol.500,2002
[11]. A Rask , D.Rubin and B Neumann ,
“Implementing Row-and Cell-Level
Security in Classified Database Using SQL
Server 2005,” MS SQL Server Technical
Center ,2005.
[12]. K.LeFevre , R. Agrawal, V, Ercegovac ,
R.Ramkrishnan , Y.Xu,and
D.Dewitt,”Limiting Disclousre in
Hipppocratic Dtabases ,” Proc.30th Int
Conf.Very Large Databases ,pp.108-
119,2004.
[13]. K.Le Fevre,D.De Witt, and R.
Ramkrishnan, ”Mondrian Multidim
mentional K-Anonymity,” Proc.22nd
Int’l
Conf.Data Eng.,pp.25-25,2006.
[14]. R.Sandhu and Q.Munawer,”The Arbac99
Model for Administration of Roles,”
Proc..15th Ann.Computer Security
Applications Conf., pp.229-238,1999.
[15]. ]K.LeFevre,D.DeWitt,and R.Ramkrishnan,
”Mondrian Multidimmentional K-
Anonymity,” Proc.22nd
Int’l Conf.Data
Eng.,pp.25-25,2006.

More Related Content

What's hot

Iaetsd database intrusion detection using
Iaetsd database intrusion detection usingIaetsd database intrusion detection using
Iaetsd database intrusion detection usingIaetsd Iaetsd
 
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...journal ijrtem
 
Prompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data BrenchPrompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data BrenchIRJET Journal
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queriesiosrjce
 
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...IRJET Journal
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationIRJET Journal
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...IJNSA Journal
 
Supporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web SearchSupporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web SearchMigrant Systems
 
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection SystemQuery Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection SystemSimran Seth
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data miningNeeda Multani
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSIJCI JOURNAL
 

What's hot (15)

Iaetsd database intrusion detection using
Iaetsd database intrusion detection usingIaetsd database intrusion detection using
Iaetsd database intrusion detection using
 
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
 
Prompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data BrenchPrompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data Brench
 
Ib3514141422
Ib3514141422Ib3514141422
Ib3514141422
 
A1802030104
A1802030104A1802030104
A1802030104
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queries
 
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...
 
Supporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web SearchSupporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web Search
 
Full paper
Full paperFull paper
Full paper
 
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection SystemQuery Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
 
Lesson10 Database security
Lesson10 Database security Lesson10 Database security
Lesson10 Database security
 

Viewers also liked

Comparison of CFD Simulation of a Hyundai I20 Model with Four Different Turbu...
Comparison of CFD Simulation of a Hyundai I20 Model with Four Different Turbu...Comparison of CFD Simulation of a Hyundai I20 Model with Four Different Turbu...
Comparison of CFD Simulation of a Hyundai I20 Model with Four Different Turbu...IJERA Editor
 
Dstu b v.2 7-181-2009
Dstu b v.2 7-181-2009Dstu b v.2 7-181-2009
Dstu b v.2 7-181-2009vpiv26
 
Registro nacional de productores de espectáculos públicos de las artes escénicas
Registro nacional de productores de espectáculos públicos de las artes escénicasRegistro nacional de productores de espectáculos públicos de las artes escénicas
Registro nacional de productores de espectáculos públicos de las artes escénicasFunkdamental By ToppomentalMC
 
Dstu b v.2 8-10-98 zmina1
Dstu b v.2 8-10-98 zmina1Dstu b v.2 8-10-98 zmina1
Dstu b v.2 8-10-98 zmina1vpiv26
 
Dstu 4363 2004
Dstu 4363 2004Dstu 4363 2004
Dstu 4363 2004vpiv26
 
Dstu n b v.2.5-37-2008
Dstu n b v.2.5-37-2008Dstu n b v.2.5-37-2008
Dstu n b v.2.5-37-2008vpiv26
 
ISO for PERFECT HEALTHCARE in Yutai
ISO for PERFECT HEALTHCARE in YutaiISO for PERFECT HEALTHCARE in Yutai
ISO for PERFECT HEALTHCARE in YutaiPETER ZHANG
 
Aportes de las TIC's en la Educacion_Yheison Roa
Aportes de las TIC's en la Educacion_Yheison RoaAportes de las TIC's en la Educacion_Yheison Roa
Aportes de las TIC's en la Educacion_Yheison Roayheisonroa
 
Making Threat Management More Manageable
Making Threat Management More ManageableMaking Threat Management More Manageable
Making Threat Management More ManageableIBM Security
 
Seasonal Variation of Groundwater Quality in Parts of Y.S.R and Anantapur Dis...
Seasonal Variation of Groundwater Quality in Parts of Y.S.R and Anantapur Dis...Seasonal Variation of Groundwater Quality in Parts of Y.S.R and Anantapur Dis...
Seasonal Variation of Groundwater Quality in Parts of Y.S.R and Anantapur Dis...IJERA Editor
 
Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptogr...
Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptogr...Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptogr...
Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptogr...IJERA Editor
 
Design and Implementation of Ipv6 Address Using Cryptographically Generated A...
Design and Implementation of Ipv6 Address Using Cryptographically Generated A...Design and Implementation of Ipv6 Address Using Cryptographically Generated A...
Design and Implementation of Ipv6 Address Using Cryptographically Generated A...IJERA Editor
 
Hybrid system with multi-connected boost converter
Hybrid system with multi-connected boost converterHybrid system with multi-connected boost converter
Hybrid system with multi-connected boost converterIJERA Editor
 
Design and Implementation of Digital Chebyshev Type II Filter using XSG for N...
Design and Implementation of Digital Chebyshev Type II Filter using XSG for N...Design and Implementation of Digital Chebyshev Type II Filter using XSG for N...
Design and Implementation of Digital Chebyshev Type II Filter using XSG for N...IJERA Editor
 
On-state Torque Optimization for Synthesized MR Fluid
On-state Torque Optimization for Synthesized MR FluidOn-state Torque Optimization for Synthesized MR Fluid
On-state Torque Optimization for Synthesized MR FluidIJERA Editor
 
Identification of Sex of the Speaker With Reference To Bodo Vowels: A Compara...
Identification of Sex of the Speaker With Reference To Bodo Vowels: A Compara...Identification of Sex of the Speaker With Reference To Bodo Vowels: A Compara...
Identification of Sex of the Speaker With Reference To Bodo Vowels: A Compara...IJERA Editor
 
Finite Element Modeling for Effect of Fire on Steel Frame
Finite Element Modeling for Effect of Fire on Steel FrameFinite Element Modeling for Effect of Fire on Steel Frame
Finite Element Modeling for Effect of Fire on Steel FrameIJERA Editor
 
Effect of MR Fluid Damping during Milling of CFRP Laminates
Effect of MR Fluid Damping during Milling of CFRP LaminatesEffect of MR Fluid Damping during Milling of CFRP Laminates
Effect of MR Fluid Damping during Milling of CFRP LaminatesIJERA Editor
 
Energy Storage: CFD Modeling of Phase Change Materials For Thermal Energy Sto...
Energy Storage: CFD Modeling of Phase Change Materials For Thermal Energy Sto...Energy Storage: CFD Modeling of Phase Change Materials For Thermal Energy Sto...
Energy Storage: CFD Modeling of Phase Change Materials For Thermal Energy Sto...IJERA Editor
 

Viewers also liked (20)

Comparison of CFD Simulation of a Hyundai I20 Model with Four Different Turbu...
Comparison of CFD Simulation of a Hyundai I20 Model with Four Different Turbu...Comparison of CFD Simulation of a Hyundai I20 Model with Four Different Turbu...
Comparison of CFD Simulation of a Hyundai I20 Model with Four Different Turbu...
 
Dstu b v.2 7-181-2009
Dstu b v.2 7-181-2009Dstu b v.2 7-181-2009
Dstu b v.2 7-181-2009
 
Registro nacional de productores de espectáculos públicos de las artes escénicas
Registro nacional de productores de espectáculos públicos de las artes escénicasRegistro nacional de productores de espectáculos públicos de las artes escénicas
Registro nacional de productores de espectáculos públicos de las artes escénicas
 
Dstu b v.2 8-10-98 zmina1
Dstu b v.2 8-10-98 zmina1Dstu b v.2 8-10-98 zmina1
Dstu b v.2 8-10-98 zmina1
 
Dstu 4363 2004
Dstu 4363 2004Dstu 4363 2004
Dstu 4363 2004
 
Dstu n b v.2.5-37-2008
Dstu n b v.2.5-37-2008Dstu n b v.2.5-37-2008
Dstu n b v.2.5-37-2008
 
Fizika
FizikaFizika
Fizika
 
ISO for PERFECT HEALTHCARE in Yutai
ISO for PERFECT HEALTHCARE in YutaiISO for PERFECT HEALTHCARE in Yutai
ISO for PERFECT HEALTHCARE in Yutai
 
Aportes de las TIC's en la Educacion_Yheison Roa
Aportes de las TIC's en la Educacion_Yheison RoaAportes de las TIC's en la Educacion_Yheison Roa
Aportes de las TIC's en la Educacion_Yheison Roa
 
Making Threat Management More Manageable
Making Threat Management More ManageableMaking Threat Management More Manageable
Making Threat Management More Manageable
 
Seasonal Variation of Groundwater Quality in Parts of Y.S.R and Anantapur Dis...
Seasonal Variation of Groundwater Quality in Parts of Y.S.R and Anantapur Dis...Seasonal Variation of Groundwater Quality in Parts of Y.S.R and Anantapur Dis...
Seasonal Variation of Groundwater Quality in Parts of Y.S.R and Anantapur Dis...
 
Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptogr...
Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptogr...Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptogr...
Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptogr...
 
Design and Implementation of Ipv6 Address Using Cryptographically Generated A...
Design and Implementation of Ipv6 Address Using Cryptographically Generated A...Design and Implementation of Ipv6 Address Using Cryptographically Generated A...
Design and Implementation of Ipv6 Address Using Cryptographically Generated A...
 
Hybrid system with multi-connected boost converter
Hybrid system with multi-connected boost converterHybrid system with multi-connected boost converter
Hybrid system with multi-connected boost converter
 
Design and Implementation of Digital Chebyshev Type II Filter using XSG for N...
Design and Implementation of Digital Chebyshev Type II Filter using XSG for N...Design and Implementation of Digital Chebyshev Type II Filter using XSG for N...
Design and Implementation of Digital Chebyshev Type II Filter using XSG for N...
 
On-state Torque Optimization for Synthesized MR Fluid
On-state Torque Optimization for Synthesized MR FluidOn-state Torque Optimization for Synthesized MR Fluid
On-state Torque Optimization for Synthesized MR Fluid
 
Identification of Sex of the Speaker With Reference To Bodo Vowels: A Compara...
Identification of Sex of the Speaker With Reference To Bodo Vowels: A Compara...Identification of Sex of the Speaker With Reference To Bodo Vowels: A Compara...
Identification of Sex of the Speaker With Reference To Bodo Vowels: A Compara...
 
Finite Element Modeling for Effect of Fire on Steel Frame
Finite Element Modeling for Effect of Fire on Steel FrameFinite Element Modeling for Effect of Fire on Steel Frame
Finite Element Modeling for Effect of Fire on Steel Frame
 
Effect of MR Fluid Damping during Milling of CFRP Laminates
Effect of MR Fluid Damping during Milling of CFRP LaminatesEffect of MR Fluid Damping during Milling of CFRP Laminates
Effect of MR Fluid Damping during Milling of CFRP Laminates
 
Energy Storage: CFD Modeling of Phase Change Materials For Thermal Energy Sto...
Energy Storage: CFD Modeling of Phase Change Materials For Thermal Energy Sto...Energy Storage: CFD Modeling of Phase Change Materials For Thermal Energy Sto...
Energy Storage: CFD Modeling of Phase Change Materials For Thermal Energy Sto...
 

Similar to The Constrained Method of Accessibility and Privacy Preserving Of Relational Database

Database Security—Concepts,Approaches, and ChallengesElisa
Database Security—Concepts,Approaches, and ChallengesElisaDatabase Security—Concepts,Approaches, and ChallengesElisa
Database Security—Concepts,Approaches, and ChallengesElisaOllieShoresna
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...IRJET Journal
 
1. Respond to other student Discussion Board providing additional
1. Respond to other student Discussion Board providing additional 1. Respond to other student Discussion Board providing additional
1. Respond to other student Discussion Board providing additional TatianaMajor22
 
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...IRJET Journal
 
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...IRJET Journal
 
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxRunning head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxtoltonkendal
 
Final review m score
Final review m scoreFinal review m score
Final review m scoreazhar4010
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemIlonaThornburg83
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarEryk Budi Pratama
 
Week - 5Report.docxjustify and support the relationship bet.docx
Week - 5Report.docxjustify and support the relationship bet.docxWeek - 5Report.docxjustify and support the relationship bet.docx
Week - 5Report.docxjustify and support the relationship bet.docxmelbruce90096
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationPeter Choi
 
A survey of confidential data storage and deletion methods
A survey of confidential data storage and deletion methodsA survey of confidential data storage and deletion methods
A survey of confidential data storage and deletion methodsunyil96
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsLindaWatson19
 
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET Journal
 

Similar to The Constrained Method of Accessibility and Privacy Preserving Of Relational Database (20)

Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Database Security—Concepts,Approaches, and ChallengesElisa
Database Security—Concepts,Approaches, and ChallengesElisaDatabase Security—Concepts,Approaches, and ChallengesElisa
Database Security—Concepts,Approaches, and ChallengesElisa
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
 
1. Respond to other student Discussion Board providing additional
1. Respond to other student Discussion Board providing additional 1. Respond to other student Discussion Board providing additional
1. Respond to other student Discussion Board providing additional
 
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
 
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
 
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxRunning head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
 
Final review m score
Final review m scoreFinal review m score
Final review m score
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Class paper final
Class paper finalClass paper final
Class paper final
 
Week - 5Report.docxjustify and support the relationship bet.docx
Week - 5Report.docxjustify and support the relationship bet.docxWeek - 5Report.docxjustify and support the relationship bet.docx
Week - 5Report.docxjustify and support the relationship bet.docx
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
 
A survey of confidential data storage and deletion methods
A survey of confidential data storage and deletion methodsA survey of confidential data storage and deletion methods
A survey of confidential data storage and deletion methods
 
E04623438
E04623438E04623438
E04623438
 
J018116973
J018116973J018116973
J018116973
 
Ijcatr04051015
Ijcatr04051015Ijcatr04051015
Ijcatr04051015
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
 

Recently uploaded

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 

Recently uploaded (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 

The Constrained Method of Accessibility and Privacy Preserving Of Relational Database

  • 1. Mr Rakesh Ramesh Tannu. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -1) July 2016, pp.54-58 www.ijera.com 54 | P a g e The Constrained Method of Accessibility and Privacy Preserving Of Relational Database Mr Rakesh Ramesh Tannu*, Prof. Sandip A. Kahate** *(Second Year Master of Engineering, Department of Computer Engineering, SPCOE, Dumbarwadi, Otur, Tal- Junnar, Dist-Pune, Maharashtra, India) ** (Assistant Professor, Department of Computer Engineering, SPCOE, Dumbarwadi, Otur, Tal-Junnar, Dist- Pune, Maharashtra, India) ABSTRACT Now in organizations or companies maximum information or data available and that data are related to tabular form means relational database. Sometimes organization wanted to distribute that particular information or data in within organization or other organization in daily basis. Here the thing is that the organization faces the some kind of problems of security related because they distributed that information for its purposes and here sometimes organization wanted that particular information will be modified or upgraded, Now they can used numbers of methods or technics for encryption and electronic signatures for given a security and protection of that particular data in during transmission network. In that protection of that protection used various different mechanisms and strong methods for accessing that specific that particular data or information. It is very well known that current or today the proper data must take as access control polices. Also some kind of methods for CIA towards database system must be adopted. Keywords: Privacy Preserving Mechanism, Access Control Mechanism, Access Control, k-anonymity, Relational Database. I. INTRODUCTION Organizations often stored and collect consumer data or information for improved the maximum their services. Access Control Mechanisms (ACM) gives a surely used that only authenticated or authorized and proper data available to users. Whenever the sensitive or private data may be wrong used or sometimes misused by authorized users to manage the privacy of consumers. Now the privacy-preservation is to used for control policies or methods on sensitive data that protection against identity disclosure by using some kind of privacy requirements. Now the private or sensitive information or data, also they can be removed of identifying attributes very easily linked attacks by the authorized or legal persons .The suppression and generalization of records to satisfy privacy requirements by using Anonymization algorithm with minimum distortion of micro or small data. The both security and protection on private or sensitive information used the particular Anonymity methods guarantee to us. Now a privacy achieved that of accuracy and imprecision are introduced in accurate or proper and authorized information under the control policy and some kind of methods. II. LITERATURE SURVEY Now in current time in various organizations those arrival data or information is a various format and increasingly size continuously in network. Sometimes the different organizations are now shifting their transactions and shopping and also their infrastructure through a web since end users. So everyone interacting to the world wide web and taking wanted his needs, due to this a large that is huge data comes at host in a network. The literature survey is an important part in this paper because its introduces past work or its regarding some functions of different authors which helpful while the whole paper. Elisa Bertino et all [1] give us a perfect solution on data security and protection used following three points: To give a security on private or sensitive information or data against unauthorized disclosure, integrity is the prevention of unauthorized and not properly or correctly data modification and availability is prevention recovery from the hardware and software problems and other regarding from malicious data access denials make the database system unavailable. Pierangela Samarati et all [2] has been defines or explains that the currently in Networking mostly demand that broadcasting and shearing the information/ data, Sometimes in past conditions released or distributed the particular information was many times in tabular and statistical format max conditions call the information on today release in particular small or micro data. To provide the protection or security on anonymity of the entities called as respondents that particular information or data refers, Now the data holders often remove or encrypting explicit identifiers like names, addresses RESEARCH ARTICLE OPEN ACCESS
  • 2. Mr Rakesh Ramesh Tannu. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -1) July 2016, pp.54-58 www.ijera.com 55 | P a g e and phone numbers. Deidentifying data/information, However gives not guarantee of anonymity released or drop particular information often conditions another data like race, birthdate, sex and ZIP code that specific information or data to publicly available to reindentify respondents and inferring information or data was not intended for disclosure. They address problems or sometimes issues of drop or releasing micro data while safeguarding the anonymity of that the respondents to which the process of k-anonymity. A table providing k- anonymity if attempts to link explicitly finding/identified information or data to that its content map that information/data to minimum k- entites. Ashwin Machanavajjhala et all [3] had been explain about two normal attacks or simple attacks that k anonymized data or information collection has some or minimum subtle but severe privacy or protection related problems are occurred. First, the attacker may be find the values of private or sensitive attributes/properties, that is a specific problem. Second, attackers often have background knowledge, and show that k-anonymity does not have guarantee against attackers using background knowledge. Now to provide a exactly analysis of these two attacks, and a novel and strong privacy criterion called l-diversity that can defend against like attacks. Alexander Brodsky et all [4] defines or explains complex/sophisticated conditions/situations of inference channels that activated while database constraints are combined/together with non private/sensitive information to obtained that the particular private or sensitive information. Now here present an integrity security mechanism, called as the Disclosure Monitor, which guaranteed or confirm data private/sensitive or confidentiality by extending the standard must access control mechanism with a Disclosure Inference Engine. That particular Engines provides and gives us that all the data/information that is disclosed to a user based on the user's past and present queries and the mata data and database constraints, Now the particular engine are operated in two modes: data dependent mode when disclosure is established based on the real data values and data independent mode while only queries are utilizing to generated the disclosed data/information, that the particular disclosure interference algorithms are two modes to characterize by the properties of soundness (i.e. everything are is make by the algorithm) The technical base or core focus on the establishment of sound and complete that algorithms on both data dependent and data independent disclosures. III. SYSTEM ARCHITECTURE 3.1 Existing System  The privacy-preservation is that the particular protection/security on identity disclosure used some other kind of requirements.  The private or sensitive information, after cancellation of identifying attributes, are untill get easily to link attacks by authorized/ legal users.  Suppression & generalization of relational data used by PPM. 3.2 Limitation of Existing System  To users no privacy used.  All queries regarding aggregate imprecision is very lass or minimum.  Micro data/small data sometimes are not known.  To individual/single person, this method not good. 3.3 Proposed System  PPM & ACM are used strongly for Relational database.  Proper Formulation the accuracy and privacy constraints.  All problems evaluation used the Heuristics process. Now the PPM gives us the confirmation for the privacy and accuracy targets are met but firstly the private/sensitive data present. The selected predicates of QI attributes through the permission of access control policy or method. The imprecision bound for each and every permission query defined by the administrator policy, role-to-permission assignments and user-to-role assignments. The authorized data/information has been on desired level of the accuracy by the surely the function of the imprecision bound. To users not shared/passed the imprecision bound data or information because knowing the imprecision bound in result in violating the particular privacy/sensitive requirements. The imprecision bound for each and every permission with PPM is wanted to meet privacy requirements. After the anonymization the particular proper tuples/records values in relation are replaced with the generalized values. In that cases, the access control enforcement over the generalization data/information need the properly explained, Now here two point discussed that Relaxed and Strict access control enforcement mechanisms over anonymized data/information. The access control enforcement by reference monitor are available two type as follows.  To permission that the all partitions that are overlapped permissions.
  • 3. Mr Rakesh Ramesh Tannu. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -1) July 2016, pp.54-58 www.ijera.com 56 | P a g e  To permission that only particular partitions that is fully enclosed permission. Fig. 1: Proposed Architecture IV. IMPLEMENTATION DETAILS Here completing all the process than used following two algorithms.  TDH-(Top Down Heuristic Algorithm)  TDH-1(Top Down Heuristic Algorithm 1)  ECC-(Elliptic Curve Cryptography) 4.1 Algorithm: Top-Down Heuristic Algorithm The TDH algorithm is mostly used the greedy and proper heuristics partitioning that divided list at median, Sometimes if the median again falls inside the specific query than again the splitting the specific partitions and when overlapped query still not occurred so the imprecision related query cannot change as both the new partitions. Now splitting the partition along the query cut and then selected the dimension/size at least along which the imprecision is for all that queries. It works under the following stages Input: T, K, Q, and BQj Output: P 1 Initialize Set of Candidate Partitions(CPT) 2 for (CPi Ԑ CP ) do 3 Find the set of quries QO that overlap CPi such that ic Qo j and icCPi > 0 4 Sort queries QO in increasing order of BQj 5 while(Feasible cut is not found) do 6 Select query from QO 7 Create query cuts in each dimension 8 Select dimension and cut having least overall imprecision for all queries in Q 9 if (Feasible cut found) then 10 Create new partition and add to CP 11 else 12 Split CPi recursively along median till anonymity requirement satisfied 13 Compact new partition and add to P 14 return (P) 4.2 Algorithm: Top-Down Heuristic Algorithm 1 Now the particular partition is divided through a logical database and its regarding constituent elements in distinct independent parts.The particular Database partition MPA(manageability, performance and availability) that particular reasons are used. The comparison between the query bound and query imprecision through the definition o the query imprecision.This Algorithm is used for repartitioning procedures . It works under the following stages Input: T,K,Q, and BQj Output: P 1 Initialize Set of Candidate Partitions(CPT ) 2 for (CPi Ԑ CP ) do //Depth-First (preorder) traversal 3 Find the set of quries QO that overlap CPi such that icQo j and icCPi > 0 4 Sort quires QO in increasing order of BQj 5 Select query from QO with smallest BQj 6 Create query cuts in each dimension 7 Reject cuts with skewed partitions 8 Select dimension and cut having least overall imprecision for all queries in Q 9 while(Feasible cut is not found) do 10 Select query from QO 11 Create query cuts in each dimension 12 Select dimension and cut having least overall imprecision for all queries in Q 13 if(Feasible cut found) then 14 Create new partitions and add to CPi 15 else 16 Split CPi recursively along median till anonymity requirement satisfied 17 Compact new partitions and add to P 18 Update BQj according to icQj and icPi , ^ Qj Ԑ Q 19 return(P) 4.3 Algorithm: Elliptic Curve Cryptography Algorithm This Algorithm is used for strong Authentication, Security and Protection. Its used to construct the Public Key Cryptography System. Its used many times public key (Asymmetric) but here instead of Asymmetric key used Random key for Sender and Receiver for performing accordingly Encryption and Decryption
  • 4. Mr Rakesh Ramesh Tannu. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -1) July 2016, pp.54-58 www.ijera.com 57 | P a g e V. EXPERIMENTAL RESULT The purposes of the experimental calculations are to check the impact of before and after partitions of table through tulpe wised. Table 1 Sensitive ID AGE ZIP CODE DISEASE 1 17 22 FLU 2 26 32 FEVER 3 32 42 DIARREA 4 37 32 FLU 5 20 22 FEVER 6 40 42 DIARREA Table 2 Anonymous ID AGE ZIP CODE DISEASE 1 0-20 10-30 FLU 2 0-20 10-30 FEVER 3 20-30 10-30 DIARREA 4 20-30 30-40 FLU 5 30-40 30-40 FEVER 6 30-40 30-40 DIARREA Table 3 Partition Accuracy Id Variations ID Before Partition Selection After Partition Selection 10 50% 60% 50 60% 70% 100 70% 80% Fig 1: Partition Accuracy ID Variations Fig 2: Partition Accuracy ID Variations Where 1:- AGE 2:- ZIP 3:- DISEASE VI. CONCLUSION AND FUTURE SCOPE The ACM and PPM are together through the framework, The ACM gives the permissions only proper/authorized query predicates on private information. The PPM anonymizes to meet the sensitive requirements and the ACM are set to predicate imprecision constraints. Now due to above all predicates regarding terms the better security methods or technics when accessing and sharing large organizational crucial relational dataset. ACKNOWLEDGMENT I would like to thanks to my project guide Prof. Sandip Kahate they have been given me proper guidance for writing this paper. REFERENCES [1]. Elisa Bertino, Fellow, IEEE, and Ravi Sandhu, Fellow, IEEE, “Database Security Concepts, Approaches, and Challenges,” IEEE Transactions On Dependable And Secure Computing, Vol. 2, No. 1, January- March 2005. [2]. Pierangela Samarati, “Database Security Concepts, Approaches, and Challenges,” IEEE Transactions on Knowledge And Data Engineering,Vol.13,No. 6, November/December 2001. Grants” WASE International Conference on Information Engineering. [3]. Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, and Muthuramakrishnan Venkit Asubramaniam, “Diversity: Privacy Beyond k-Anonymity,” IEEE Transactions on Industrial Electronics, Vol. 59, No. 1, January 2012. [4]. S. Chaudhuri, T. Dutta, and S. Sudarshan, “Fine Grained Authorization through Predicated Grants,” IEEE Transactions On
  • 5. Mr Rakesh Ramesh Tannu. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -1) July 2016, pp.54-58 www.ijera.com 58 | P a g e Dependable And Secure Computing, Vol. 2, No. 1, January-March 2012. [5]. A Standard for Role-Based Access Control” IEEE Transactions on Industrial Informatics, Vol. 9, No. 1, Feb 2013. [6]. A. Meyerson and R. Williams, “The Complexity of Optimal k-Anonymity,” IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. [7]. G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas,and A. Zhu, “Approximation Algorithms for k- Anonymity computers and security,” IEEE Transactions On Dependable And Secure Computing, Vol. 1, No. 1, January-March 2013. [8]. Li Liu,Murat Kantarcioglu and Bhavani Thuraisingham “Privacy Preserving Decision Tree Mining from Perturbed Data” International Conference on System Sciences, 2009. [9]. Rezwan Ahmed, George Karypis “Algorithms for Mining the Evolution of Conserved Relational States in Dynamic Networks” IEEE International conference on Big Data, 2014. [10]. K. Browder and M.Davidson, “The Virtual Private Database in oracle9ir2” Oracle Technical White Paper ,vol.500,2002 [11]. A Rask , D.Rubin and B Neumann , “Implementing Row-and Cell-Level Security in Classified Database Using SQL Server 2005,” MS SQL Server Technical Center ,2005. [12]. K.LeFevre , R. Agrawal, V, Ercegovac , R.Ramkrishnan , Y.Xu,and D.Dewitt,”Limiting Disclousre in Hipppocratic Dtabases ,” Proc.30th Int Conf.Very Large Databases ,pp.108- 119,2004. [13]. K.Le Fevre,D.De Witt, and R. Ramkrishnan, ”Mondrian Multidim mentional K-Anonymity,” Proc.22nd Int’l Conf.Data Eng.,pp.25-25,2006. [14]. R.Sandhu and Q.Munawer,”The Arbac99 Model for Administration of Roles,” Proc..15th Ann.Computer Security Applications Conf., pp.229-238,1999. [15]. ]K.LeFevre,D.DeWitt,and R.Ramkrishnan, ”Mondrian Multidimmentional K- Anonymity,” Proc.22nd Int’l Conf.Data Eng.,pp.25-25,2006.