Access control using k-anonymity on Sensitive Information by query evaluation unauthorized users outsourced database (ACM) Role-predicated access control (PPM)

K. V.L Prasanthi, Ms. Veena Trivedi


Micro data refers to series of records, each record with information on an individual unit like a patient or an organization. Access Control Mechanisms (ACM) bulwarks the sensitive information from unauthorized users. Even sanctioned users may misuse the data to reveal the privacy of individuals to whom the data refers to. Privacy Auspice Mechanism (PPM) anonymize the relational data to avert identity and attribute disclosure. It is achieved by generalization or suppression. Role-predicated access control gives users the sanctions to access the data predicated on their roles. The access control policies define cull predicates available to roles while the privacy requisite is to satiate the k-anonymity or l-diversity. Imprecision bound constraint is assigned for each cull predicate. Top Down Cull Mondrian (TDSM) algorithm is utilized for query workload-predicated anonymization algorithm is constructed utilizing acquisitive heuristics and kd-tree model.


Access control; k-anonymity; Sensitive Information; query evaluation; unauthorized users; outsourced database; Access Control Mechanisms (ACM); Role-predicated access control; Privacy Auspice Mechanism; (PPM); Anonymization

Full Text:


Copyright (c) 2015 K. V.L Prasanthi, Ms. Veena Trivedi

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


All published Articles are Open Access at 

Paper submission: