Scrutinize The Utility Of Preserved Data

  • Mounika. Kodela, Pranathi.Sivva, Muthamil Sudar K, Nagaraj.P

Abstract

A large amount of data which has been handled over a sector in note to that the data which has been
collected from the source will be stored in a database. The admin has the authority of approving the
manager so that after the approval of admin the manager can access the application. Once the manager
gets declined by the admin the can't able to login in that process the manager won’ t be able to access the
application. The details which have been stored can be retrieved later in case of using those details or
viewing that information. The admin and the manager is one who can able to view the actions performed
by the employees. By handling these data by the admin, he can view the data. In case of loss of data or
theft of data in a form of attack the manager and the admin can view the details of the employee who has
been attacked in the form of tables. The action can be performed here. The details can be attacked by four
methods such as a data linkage attack, attribute attack, table linkage attack and probabilistic attack. By
these attacks, we can attack the details of an individual by getting their id which has been published. By
this action the manager and the admin can view the details of the employee who has been attacked.
Keywords Privacy preserving, Scrutinize, Security

Published
2020-05-20