High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Implement l-Diversity by using Suppression Algorithm

Author(s):

Miss Swati Abhimanyu Nase , ME(CSE),CSMSSS CHH Shahu college of Engineering ,Aurangabad,Maharashtra

Keywords:

L-diversity, Relational database system, Background knowledge attack, Role base access control system, L-diversity, Quasi identifier

Abstract

K-anonymity introduced due to security risk in Relational database system .To avoid identity disclosure of individuals depending upon Background knowledge attack in Role base access control system L-diverse record retrieve to maintain privacy of individual. One record in table has same Quasi identifier at least k-1 record, to implement L-diversity .This paper represent how L-diversity implemented by using suppression algorithm.

Other Details

Paper ID: IJSRDV5I60248
Published in: Volume : 5, Issue : 6
Publication Date: 01/09/2017
Page(s): 288-289

Article Preview

Download Article