Page 1757 Privacy-Preserving Access Control Mechanism for Incremental Data Varanasi Avinash M.Tech Student Department of CSE Miracle Educational Society Group of Institutions. Saragadam Sridhar, M.Tech, Ph.D Assistant Professor Department of CSE Miracle Educational Society Group of Institutions. Abstract: Access control Mechanisms are security features that control how users and systems communicate and interact with other systems and resources. Access control mechanisms give organization the ability to control, restrict, monitor, and protect resource availability, integrity and confidentiality. Privacy Protection Mechanism (PPM) uses suppression and generalization of relational data to anonymize and satisfy privacy needs. The access control policies define selection predicates available to roles while the privacy requirement is to satisfy the k-anonymity or l-diversity. Imprecision bound constraint is assigned for each selection predicate. Essentially analysis within the data processing or information mining with sub space of information security is loosely classified into access management analysis and data privacy analysis. Each plays vital role in information security thence we've integrated these methodologies to boost our security on relative information. Mistreatment privacy protective mechanism we will generalize and suppress our relative information to anonymize and satisfy privacy needs against identity and attribute speech act. In this paper we implement a Privacy Protection Mechanism for protecting sensitive information from unauthorized users. Keywords: Privacy, k-anonymity, l-diversity, Imprecision bounds, Access control. Introduction: Data privacy problems are getting progressively vital for our society. This can be proved by the very fact that the accountable management of sensitive knowledge is expressly being mandated through laws like the Sarbanes-Oaxley Act and therefore the insurance movability and answerability Act (HIPAA). Protective individual privacy is a crucial downside. Access management mechanisms area unit accustomed make sure that solely approved data is obtainable to users. However, sensitive data will still be illused by approved users to compromise the privacy of shoppers. Databases within the globe area unit typically massive and sophisticated. The challenge of querying such infuse in a very timely fashion has been studied by the database, data processing and knowledge retrieval communities, however seldom studied within the security and privacy domain. We have a tendency to have an interest within the downside of protective access privacy for users once querying massive databases of many lots of or thousands of gigabytes of knowledge. This can be a more durable downside than in alternative domains as a result of the matter contents of queries area unit themselves protected against the info server. The concept of privacy-preservation for sensitive data can require the enforcement of privacy policiesor the protection against identity disclosure by satisfying some privacy requirements. We investigate privacy- preservation from the anonymity aspect. Anonymization algorithms use suppression and generalization of records to satisfy privacy requirements with minimal distortion of micro data. The anonymity techniques can be used with an access control mechanism to ensure both security and privacy of the sensitive information. The privacy is achieved at the cost of accuracy and imprecision is introduced in