期刊文献+

外包数据库隐私保护问题研究进展 被引量:3

Study on Privacy Preserving in Database Outsourcing Scenario
下载PDF
导出
摘要 数据库外包服务是信息技术外包服务的重要内容之一,经济全球化使得数据库外包现象日益普及.外包数据库应用系统中的隐私保护问题是影响组织是否选择外包业务的重要因素之一,因此,研究外包数据库的隐私保护问题具有重要的学术价值和应用前景.详细介绍了外包数据库隐私保护问题的内涵,系统概括了外包数据库应用系统隐私保护的研究进展及不足,最后探讨了外包数据库隐私保护问题研究的发展趋势. Database outsourcing is one of the key issues of information service outsourcing. Database As Service (DAS) will be accepted by the organizations when the privacy of outsourced database promises, so the privacy preserving is an important topic in the area. The paper introduces the concept of privacy preserving, discusses the progress in privacy preserving, and points out the studying trends in this area.
出处 《平顶山学院学报》 2012年第5期72-76,共5页 Journal of Pingdingshan University
基金 国家自然科学基金(71172190) 安徽省自然科学基金(11040606M140) 教育部人文社会科学研究规划基金(12YJA630136) 安徽高校省级自然科学研究重大项目(KJ2010ZD01) 安徽财经大学校级青年科研项目(ACKYQ1229)
关键词 外包数据库 隐私保护 推理 outsourced database privacy preserving inference
  • 相关文献

参考文献20

  • 1Hacigumus H,Iyer B, Mehrotra S. Providing Database as a Service[C].San Jose:Proc. of the 18th int. conf. on Da- ta Engineering,2002:29 - 38.
  • 2Radu Sion. Towards Secure Data Outsourcing[ M ]//Gertz M,Jajodia S. The Handbook of Database Security: Applications and Trends. Berlin: Springer Verlag,2008: 137 - 161.
  • 3孟小峰,周龙骧,王珊.数据库技术发展趋势[J].软件学报,2004,15(12):1822-1836. 被引量:176
  • 4朱勤,骆轶姝,乐嘉锦.数据库加密与密文数据查询技术综述[J].东华大学学报(自然科学版),2007,33(4):543-548. 被引量:22
  • 5朱勤,于守健,乐嘉锦,骆轶姝.外包数据库系统安全机制研究[J].计算机科学,2007,34(2):152-156. 被引量:17
  • 6He J, Wang M. Cryptography and Relational Database Management Systems[ C]. Grenoble : Database Engineering and Application Symposium, 2001 : 273 - 284.
  • 7Damiani E, de Capitani di Vimercati S, Foresti S. , et al. Selective Data Encryption in Outsourced Dynamic Environments[ J]. Electronic Notes in Theoretical Computer Science,2007, 168:127 - 142.
  • 8de Capitani di Vimercati S, Foresti S, Jajodia S. Overencryption: Management of Access Control Evolution on Outsourced Data[ C]. Vienna:Proc. of the 33rd Int. Conference on Very Large Data Bases ,2007 :123 -134.
  • 9Vimercati S, Foresti S, Jajodia S, et al. Encryption Policies for Regulating Access to Outsourced Data[ J ]. ACM Transactions on Database Systems,2010,35 (2).
  • 10Bennani N, Damiani E, Cimato S. Toward cloud - based key management for outsourced databases [ C ]. Seoul: 34th Annum IEEE Computer Software and Applications Conference Workshops ,2010:232 - 236,.

二级参考文献60

  • 1王元珍,冯超.数据库加密系统的研究与实现[J].计算机工程与应用,2005,41(8):170-172. 被引量:44
  • 2马勺布,胡磊,徐德启.一种动态安全的密文数据库检索方法[J].计算机工程,2005,31(6):132-133. 被引量:19
  • 3Rizvi S,Mendelzon A,Sudarshan S,Roy P.Extending query rewriting techniques for fine-grained access control.In:ACM SIGMOD Conf.Paris,2004.551-562.
  • 4Bell DE,LaPadula LJ.Secure computer systems:Unified exposition and multics interpretation.Technical Report,ESD-TR-75-306,Bedford:MITRE Corp.,1976.
  • 5Jajodia S,Meadows C.Inference problems in multilevel secure database management systems.In:Abrams M,Jajodia S,Podell H,eds.Information Security:An Integrated Collection of Essays.Los Alamitos:IEEE Computer Society Press,1995.570-584.
  • 6Tzong,Ozsoyoglu G.Controlling FD and MVD inferences in multilevel relational database systems.IEEE Trans.on Knowledge and Data Engineering,1991,3(4):474-485.
  • 7Stickel M.Elimination of inference channels by optimal upgrading.In:Proc.of the 1994 IEEE Symp.on Research in Security and Privacy.Oakland,1994.168-174.
  • 8Hinke T.Inference aggregation detection in database management systems.In:Proc.of the IEEE Symp.on Security and Privacy.1998.96-106.
  • 9Lunt TF,Denning DE,Schell RR,Heckman M,Shockley WR.The seaview security model.IEEE Trans.on Software Engineering,1990,16(6):593-607.
  • 10Morgenstern M.Controlling logical inference in multilevel database systems.In:Proc.of the IEEE Symp.on Security and Privacy.1998.245-255.

共引文献218

同被引文献5

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部