Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
PROTECTION OF DATABASE SECURITY VIA COLLABORATIVE INFERENCE DETECTION
Post: #1

PROTECTION OF DATABASE SECURITY VIA COLLABORATIVE INFERENCE DETECTION

Abstract: Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation detection system to protect sensitive data content. Based on data dependency, database schema and semantic knowledge.
we constructed a semantic inference model (SIM) that represents the possible inference channels from any attribute to the pre-assigned sensitive attributes. The SIM is then instantiated to a semantic inference graph (SIG) for query-time inference violation detection.
For a single user case, when a user poses a query, the detection system will examine his/her past query log and calculate the probability of inferring sensitive information. The query request will be denied if the inference probability exceeds the pre specified threshold.
For multi-user cases, the users may share their query answers to increase the inference probability. Therefore, we develop a model to evaluate collaborative inference based on the query sequences of collaborators and their task-sensitive collaboration levels.
Experimental studies reveal that information authoritativeness, communication fidelity and honesty in collaboration are three key factors that affect the level of achievable collaboration. An example is given to illustrate the use of the proposed technique to prevent multiple collaborative users from deriving sensitive information via inference.
 

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  WORMHOLE ATTACK DETECTION IN WIRELESS ADHOC SENSOR NETWORKS seminar class 7 3,481 17-08-2016 09:23 AM
Last Post: jaseela123
  Brain Tumour Detection Using Water shedding and basic Image Processing Techniques smart paper boy 2 1,934 01-08-2015 02:53 PM
Last Post: seminar report asees
  STUDY OF SUBSTATION EQUIPMENT AND PROTECTION smart paper boy 2 3,217 26-07-2015 07:10 AM
Last Post: AlbertDodo
  Micro Controller based Security System using Sonar seminar projects crazy 3 2,581 28-09-2014 05:50 PM
Last Post: Guest
  MOBILE DETECTION AND JAMMING computer science crazy 14 10,872 13-11-2013 05:35 AM
Last Post: Guest
  AUTOMATIC ENERGY SAVING SYSTEM WITH HUMAN HEAT DETECTION smart paper boy 11 5,727 27-08-2013 10:41 AM
Last Post: computer topic
  Home Security System A Project Report electronics seminars 16 24,111 22-04-2013 12:58 PM
Last Post: computer topic
  AUTOMATED TOLL COLLECTION AND ALCHCOL DETECTION USING PSOC full report project topics 6 6,133 08-04-2013 03:28 PM
Last Post: computer topic
  FingerPrint Based Security System seminar topics 5 7,033 10-03-2013 05:23 PM
Last Post: Guest
  AUTOMATIC VEHICLE ACCIDENT DETECTION AND MESSAGING SYSTEM USING GSM AND GPS MODEM smart paper boy 14 8,883 02-01-2013 06:16 PM
Last Post: naidu sai