期刊文献+

强制数据隐私和用户隐私的外包数据库服务研究 被引量:8

Enforcing data privacy and user privacy over outsourced database service
下载PDF
导出
摘要 外包数据库中的数据隐私和用户隐私保护是现代外包数据库服务面临的新挑战,针对目前外包数据库服务中单方面考虑数据隐私保护或用户隐私保护技术难以同时满足外包数据库安全需求的不足,提出一种可同时强制数据隐私和用户隐私保护的外包数据库服务模型,采用属性分解和部分属性加密技术,基于结合准标志集自动检测技术的近似算法实现外包数据的最小加密属性分解,同时把密码学应用于辅助随机服务器协议,以实现数据库访问时的用户隐私保护。理论分析和实验结果表明,该模型可以提供有效的数据隐私保护和查询处理,以及较好的用户隐私保护计算复杂度。 It is crucial to design solutions able to respond to privacy guarantees with a clear integration strategy for existing ap- plications and a consideration of the performance impact of the protection measures. This paper proposed a novel solution to enforce data privacy and user privacy over outsourced database services. The approach started from a flexible definition of pri- vacy constraints on a relational schema, applied encryption on information in a parsimonious way and mostly relied on attribute partition to protect sensitive information. Based on the approximation algorithm for the minimal encryption attribute partition with quasi-identifier detection, the approach allow storing the outsourced data on an untrusted database server and minimizing the amount of data represented in encrypted format, it could also solve the problem of private information retrieval to protect user privacy by applying cryptographic technology on the auxiliary random server protocol. The theoretical analysis and experi- mental resuhs show that the new model can provide efficient data privacy protection and query processing, efficient in computa- tional complexity and dose not increase the cost of communication complexity of user privacy protection.
出处 《计算机应用研究》 CSCD 北大核心 2011年第1期304-308,共5页 Application Research of Computers
基金 国家"863"计划资助项目(2007AA01Z448) 安徽省省级高校自然科学研究重点项目(KJ2010A003) 南京大学计算机软件新技术国家重点实验室开放课题(KFKT2010B01)
关键词 外包数据库服务 数据隐私 用户隐私 属性分解 加密 outsourced database services data privacy user privacy attribute partition encryption
  • 相关文献

参考文献16

  • 1HACIGUMUS H, IYER B, MEHROTRA S.Providing database as a service[C]//Proc of International Conference on Data Engineering.New York: IEEE Press,2002:29-38.
  • 2MEHROTRA S, HACIGUMUS H, IYER B.Efficient execution of aggregation queries over encrypted relational databases[C]//Proc of Lecture Notes in Computer Science.Berlin:Springer,2004:125-136.
  • 3AGRAWAL R, KIERNAN J, SRIKANT R, et al.Order-preserving encryption for numeric data[C]//Proc of ACM SIGMOD International Conference on Management of Data.New York: ACM Press,2004:563-574.
  • 4Trusted Computing Group.TPM specification version 1.2.Part 1 Design Principles[EB/OL].[2007-08-08].https://www.trustedcomputing-group.org/ specs/TPM/Main_Part1_rev94.zip.
  • 5ARRARWAL G, MISHRA N, PINKS B.Secure computation of the k th-ranked element[C]//Proc of Lecture Notes in Computer Science.Berlin: Springer,2004:40-55.
  • 6KANTARCIOGLU M, CLIFTON C.Security issues in querying encrypted data[R].Technical Report TR-04-013, Purdue University,2004.
  • 7AGRAWAL G, BAWA M, GANESAN P, et al.Two can keep a secret: a distributed architecture for secure database services[C]//Proc of the 2nd Biennial Conference on Innovative Data Systems Research.Asilomar CA:[s.n.], 2005: 186-199.
  • 8MOTRO A, PARISI-PRESICCE F.Blind custodians:a database service architecture that supports privacy without encryption[C]//Proc of Lecture Notes in Computer Science.Berlin:Springer,2005:338-352.
  • 9GENTRY C, RAMZAN Z.Single-database private information retrieval with constant communication rate[C]//Proc of the 32nd International Colloquium on Automata, Languages and Programming.Berlin: Springer,2005:803-815.
  • 10WOODRUFF D, YEKHANIN S.A geometric approach to information theoretic private information retrieval[C]//Proc of the 20th Annual IEEE Conference on Computational Complexity.Washington, DC: IEEE Computer Society,2005:275-284.

同被引文献52

引证文献8

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部