期刊文献+

基于分解与加密的云数据库隐私保护机制研究 被引量:10

Fragmentation and Encryption-Based Privacy-preserving Mechanism for Cloud Database
下载PDF
导出
摘要 针对租户对云数据库服务模式下数据隐私保护的需求,提出了一种基于分解与加密的云数据库隐私保护机制。租户根据自身的隐私保护需求定义隐私约束,由云服务提供商平台的可信数据隐私保护模块根据隐私约束完成最少加密属性分解,并对分解结果中一部分属性的数据值加密实现数据隐私保护,从而建立了基于分解与加密的云数据库隐私保护模型。对该隐私保护模型进行了扩展,实现了防止数据分布隐私泄漏、减小服务提供商平台负载和对可排序属性进行范围查询的目的。 To protect data privacy of cloud databases, a privacy-preserving mechanism based on fragmentation and encryption is proposed. By adopting the mechanism, tenants could customize their own privacy constraints. The cloud service provider (CSP) implements the least encrypted-attributes fragmentation according to tenant' s privacy constraints, and encrypts the data of a part of the frag- mented results. A privacy-preserving model including CSP, tenants, users and trusted third party (TTP) is established. To prevent privacy leakage through data distribution, reduce the CSP workload, and support range query on ordered attributes, the model is extended in three aspects.
出处 《信息工程大学学报》 2012年第3期376-384,共9页 Journal of Information Engineering University
关键词 属性分解 加密 隐私保护 云计算 attributes fragmentation encryption privacy preservation cloud computing
  • 相关文献

参考文献14

二级参考文献310

共引文献3315

同被引文献66

  • 1叶杰敏,刘国华,貟慧,石丹妮,吴云龙,费凡.Attribute-or模型下不确定关系的无损分解算法[J].计算机研究与发展,2013,50(S1):117-124. 被引量:1
  • 2Hakan H, Bala I, Sharad M. Providing Database as a Service [ C ://Proc of the 18th International Conference on Data Engineer- ing (ICDE). 2002: 29-38.
  • 3Damiani E,Vimercati S D, Jajodia S, et al. Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs [ C ]// Proc. of the 10'h ACM Conference on Computer and Communications Security. New York:ACM Press,2003:93-102.
  • 4Aggarwal G, Bawa M, Ganesan P, et al. Two can Keep a Secret : a Distributed Architecture for Secure Database Services [ C ]// Proc of the 2th Conference on Innovative Data System Research( CIDR' 05). 2005:186-199.
  • 5Ganapathy V,Thomas D, Feder T, et al. Distributing Data for Secure Database Services [ C ]//Proc of the 4th International Workshop on Privacy and Anonymity in the Information Society. Uppsala,Sweden,2011:217-221.
  • 6Li Xiong,Slawomir G,Vaidy S. Adaptive, Secure, and Scalable Distributed Data Outsourcing: A Vision Paper[ C ]//Proc of the 3rd Data-Intensive Application, Programming Abstractions, and System. San Jose, USA, 2011:1-6.
  • 7Tamer Ozsu M,Valduries P. Principles of Distributed Database Systems[ M]. 2nd edition. Prentice Hall, 1999.
  • 8Motro A,Presicce F. Blind custodians : A Database Service Architecture That Supports Privacy Without Encryption [ J ]. Data and Applications Security, LNCS 3654, Berlin : Springer,2005:338-352.
  • 9Zhu Yan, Ma Di,Wang Shanbiao. Secure Data Retrieval of Outsourced Data with Complex Query Support [ C ]//Proc of the 32nd International Conference on Distributed Computing Systems Workshops. 2012:481-490.
  • 10Hakan H,Bala I,Sharad M.Providing Database as a Service[C]//Proc of the 18th International Conference on Data Engineering(ICDE).San Jose,California,USA,2002:29-38.

引证文献10

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部