期刊文献+

数据库隐私保护技术研究

Research on Database Privacy Protection
下载PDF
导出
摘要 由于数据库系统正面临越来越多的隐私信息泄露的威胁,如何在数据库中保护用户隐私成为一个研究热点。这里概述了数据库隐私保护研究的现状,分析了常用的隐私保护技术,包括用户认证、访问控制和推理控制等,并介绍了其最新研究进展。对数据挖掘中的隐私保护进行了探讨,展望了数据库隐私保护技术研究的发展方向。研究认为,权衡安全性和可用性两方面的合理需求是构建隐私保护数据库的技术关键。 Nowadays, there are a lot of researches on protecting the privacy of users because the database systems are suffering more and more disclosure of privacy information. In this paper, the state-of-the-art of database privacy protection is overviewed, methods of privacy protection including user authentication, access control, and inference control are analyzed, and the latest progresses are introduced. Furthermore, privacy protections in data mining and future researches on database privacy protection are discussed. A conclusion is drawn at the end of this paper that it is critical to trade off the security and the availability to build a privacy protected database.
出处 《东华大学学报(自然科学版)》 CAS CSCD 北大核心 2006年第5期21-26,共6页 Journal of Donghua University(Natural Science)
基金 2005年江苏省高校自然科学研究计划(编号:05KJD520168) 2006年东华大学科技发展基金
关键词 数据库 隐私保护 访问控制 推理通道 推理控制 database, privacy protection, access control, inference channel, inference control
  • 相关文献

参考文献18

  • 1L.Brankovic,V Estivivll-Castro,彭惜君.数据挖掘的隐私问题[J].统计与信息论坛,2005,20(3):106-110. 被引量:12
  • 2Agrawal R,Srikant R.Privacy preserving data mining.ACM SIGMOD'00,Dallas,USA,May 2000
  • 3Rakesh Agrawal,Jerry Kiernan,Rarnakrishnan Srikant,et al.Hippocratic Databases.28th VLDB Conference,Hong Kong,China,2002
  • 4Volchkov A.Revisiting Single Sign-on:A pragmatic approach in a new context.IEEE IT Professional,2001,3(1):39-45
  • 5Sanhu R S,Coyne E J Feinstein H L,et al.Role-based access models.IEEE Computer,1996,29(2):38-47
  • 6Park J,Sandhu R.Originator control in usage control.IEEE 3rd International Workshop on Policies for Distributed Systems and Networks,Monterey,California,USA,2002
  • 7Jaehong Park,Ravi Sandhu.The UCONABC usage control model.ACM Transactions on Information and System Security,2004,7(1):128-174
  • 8Donald G Marks.Inference in MLS database systems.IEEE Transaction on Knowledge and Data Engineering.1996,8(1):46-55
  • 9朱虹,史凌云,张勇.多级安全数据库系统推理问题研究[J].计算机工程与应用,2004,40(13):179-181. 被引量:14
  • 10T Su,G Ozsoyoglu.Controlling FD and MVD Inferences in multilevel relational database systerr.IEEE Transactions on Knowledge and Data Engineering,1991,3(4):474-485

二级参考文献13

  • 1Alexander Brodsky,Csilla Farkas,Sushil Jajodia. Secure Databases:Constraints,Inference Channels,and Monitoring Disclosures[J].IEEE Transactions on Knowledge and Data Engineering, 2000; 12 (6)
  • 2S Jajodia,C Meadows. Inference problem in Multilevel Secure Database Management Systems, Information Security[C].In: M D Abrams,S Jajodia,H Podell eds.An Integrated Collection of Essays,Los Alamitos,Cailf:IEEE CS Press, 1995:570~584
  • 3Donald G Marks. Inference in MLS Database Systems[J].IEEE Transactions on Knowledge and Data Engineering,1996;8(1) :46~55
  • 4National Computer Security Center. Polyinstantiation Issues in Secure Database Management Systems[R].NCSC TECHNICAL REPORT-005,Volume 3/5,1996-05
  • 5A Motro,D G Marks,S Jajodia. Aggregation in relational databases:Controlled disclosure of sensitive information[C].In:Proceedings of ESORICS-94,Third European Symposium on Research in Computer Science, Springer-Verlag, Berlin, Germany, 1994: 431~445
  • 6T Su,G Ozsoyoglu. Controlling FD and MVD inferences in multilevel relational database system[J].IEEE Transactions on Knowledge and Data Engineering, 1991 ;3(4) :474~485
  • 7T F Lunt. Aggregation and inference:Facts and fallacies[C].In:proceedings of IEEE Symposium on Security and Privacy,1989~05 :102~109
  • 8Hinke Thomas H.Inference Aggregation Detection in Database Management Systems[C].In:Proc IEEE Symp Research in Security and Privacy ,Oakland, CA ,New York, 1988:96~106
  • 9D E Denning.A Preliminary Note on the Inference Problem in Multilevel Database Systems[C].In :Proceedings of the National Computer Security Center Invitational Workshop on Database Security,1986-06
  • 10(美)Adam N R, Jones D H.Security of statistical databases with an output perturbation techiniqueournal[J].Journdl of Management and Information Systems,1989, 6 (1): 101-110.

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部