Title
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
Abstract
Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized user can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization of relational data to anonymize and satisfy privacy requirements, e.g., $k$-anonymity and $l$-diversity, against identity and attribute disclosure. However, privacy is achieved at the cost of precision of authorized information. In this paper, we propose an accuracy-constrained privacy-preserving access control framework. The access control policies define selection predicates available to roles while the privacy requirement is to satisfy the $k$ -anonymity or $l$ -diversity. An additional constraint that needs to be satisfied by the PPM is the imprecision bound for each selection predicate. The techniques for workload-aware anonymization for selection predicates have been discussed in the literature. However, to the best of our knowledge, the problem of satisfying the accuracy constraints for multiple roles has not been studied before. In our formulation of the aforementioned problem, we propose heuristics for anonymization algorithms and show empirically that the proposed approach satisfies imprecision bounds for more permissions and has lower total imprecision than the current state of the art.
Year
DOI
Venue
2014
10.1109/TKDE.2013.71
Knowledge and Data Engineering, IEEE Transactions  
Keywords
Field
DocType
authorisation,data protection,query processing,relational databases,PPM,access control policies,accuracy constraints,accuracy-constrained privacy-preserving access control mechanism,anonymization algorithms,attribute disclosure,authorized information precision,authorized user,empirical analysis,identity disclosure,imprecision bound,imprecision bounds,k-anonymity,l-diversity,person privacy,privacy protection mechanism,privacy requirement anonymization,privacy requirement satisfaction,query processing,relational data generalization,relational data suppression,selection predicates,sensitive information protection,sensitive information sharing,unauthorized users,workload-aware anonymization,$k$-anonymity,Access control,privacy,query evaluation
Protection mechanism,Data mining,Relational database,Computer science,k-anonymity,Heuristics,Access control,Predicate (grammar),Information sensitivity,Privacy software
Journal
Volume
Issue
ISSN
26
4
1041-4347
Citations 
PageRank 
References 
6
0.48
14
Authors
4
Name
Order
Citations
PageRank
Zahid Pervaiz1101.55
Aref, W.G.21459.25
Arif Ghafoor32367275.36
Nagabhushana Prabhu460.48