The application of anonymous mechanism in access control

Nowadays people pay increasing attention to protect privacy, as a result, the technology of access control has been widely used. However, there are several problems if people are merely using access control to protect the privacy, for example, people should make permission assignment for every different users so the process of work is usually extremely tedious. In order to solve these problems and to further enhance the performance of privacy protection, we proposed an anonymous mechanism which is applied to the access control. We combined K-anonymity and orient to privacy protection access control model PRBAC, in addition, designed a scene to verify that this method can effectively solve the problems exist now.

[1]  R. Suganya,et al.  Data Mining Concepts and Techniques , 2010 .

[2]  R. Sandhu,et al.  Access control: principles and practice , 1994, IEEE Commun. Mag..

[3]  Elisa Bertino,et al.  State-of-the-art in privacy preserving data mining , 2004, SGMD.

[4]  Keun Ho Ryu,et al.  PRBAC: an extended role based access control for privacy preserving data mining , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).

[5]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.

[6]  Philip S. Yu,et al.  Anonymizing Classification Data for Privacy Preservation , 2007, IEEE Transactions on Knowledge and Data Engineering.

[7]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[8]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[9]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[10]  Pierangela Samarati,et al.  Generalizing Data to Provide Anonymity when Disclosing Information , 1998, PODS 1998.

[11]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.