Abstract:Access Control Mechanism provide security to information from unauthorized users. Even
authorized person may illegally use the data to dispose the privacy of individuals to whom the data belongs to.
Privacy Protection Mechanism [PPM] anonymize the relation to prevent identity and attributes disclosure.
Privacy Protection Mechanism needs to satisfy the constrained like imprecision bound along with privacy
requirements. For satisfy privacy requirements it needs suppression and generalization techniques of
anonymization algorithm.
[1] "Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data" Zahid Pervaiz, Walid G. Aref, Senior
Member, IEEE, Arif Ghafoor, Fellow, IEEE, and Nagabhushana Prabh.
[2] K. Browder and M. Davidson, "The Virtual Private Database in oracle9ir2," Oracle Technical White Paper, vol. 500, 2002.
[3] S. Chaudhuri, T. Dutta, and S. Sudarshan, "Fine Grained Authorization through Predicated Grants," Proc. IEEE 23rd Int'l Conf.
Data Eng., pp. 1174-1183, 2007.
[4] K. LeFevre, D. DeWitt, and R. Ramakrishnan, "Mondrian Multidimensional K-Anonymity," Proc. 22nd Int'l Conf. Data Eng., pp.
25- 25, 2006.
[5] T. Iwuchukwu and J. Naughton, "K-Anonymization as Spatial Indexing: Toward Scalable and Incremental Anonymization," Proc.
33rd Int'l Conf. Very Large Data Bases, pp. 746-757, 2007.
[6] P. Samarati, "Protecting Respondents' Identities in Microdata Release," IEEE Trans. Knowledge and Data Eng., vol. 13, no. 6, pp.
1010-1027, Nov. 2001.
[7] A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubrama- niam, "L-Diversity: Privacy Beyond k-anonymity," ACM Trans.
Knowledge Discovery from Data, vol. 1, no. 1, article 3, 2007.
[8] E. Bertino and R. Sandhu, "Database Security-Concepts, Approaches, and Challenges," IEEE Trans. Dependable and Secure
Computing, vol. 2, no. 1, pp. 2-19, Jan.-Mar. 2005.
[9] "Approximation Algorithms for k-Anonymity" Gagan Aggarwal,Tomas Feder,Rajeev Motwani,Rina Panigraphy.