Paper Title:
Enforcing Data Privacy in Outsourced Database Services
  Abstract

Advances in networking technologies and the continued growth of the internet have triggered a new trend towards outsourcing data management and information technology needs to external service providers, and privacy requirements have an increasing impact on such real-world applications. In this paper, we propose a solution to enforce data privacy over outsourced database services. The approach starts from a flexible definition of privacy constraints on a relational schema, applies encryption on information in parsimonious way and mostly relies on attribute partition to protect sensitive information. Based on the approximation algorithm for the minimal encryption of attribute partition and the decomposition of SQL queries, the approach allows storing the outsourced data on a single database server and minimizing the amount of data represented in encrypted format, and allows executing queries over encrypted outsourced database efficiently.

  Info
Periodical
Advanced Materials Research (Volumes 255-260)
Edited by
Jingying Zhao
Pages
2224-2228
DOI
10.4028/www.scientific.net/AMR.255-260.2224
Citation
Y. H. Yu, W. Y. Bai, "Enforcing Data Privacy in Outsourced Database Services", Advanced Materials Research, Vols. 255-260, pp. 2224-2228, 2011
Online since
May 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Xi Yuan Zhang, Wei Wang, Huan Wang
Abstract:In order to assess the condition of smart grid equipment in real time, a method of information processing for condition monitoring based on...
338
Authors: Xiang Fu Meng, Xiao Yan Zhang, Xiao Xi Li
Abstract:Users often have imprecise ideas when searching the autonomous Web databases and thus may not know how to precisely formulate queries that...
549
Authors: Lu Zhang, Yan Ling Shang
Chapter 17: Manufacturing Process Planning and Scheduling
Abstract:With the rapid development of database technology and the explosive data growth, we urgently need a new smart technology to help us translate...
4312
Authors: Na Su, Feng Feng Liao, Zhe Hui Wu
Chapter 6: Algorithm Design
Abstract:The independency between two attribute subsets can be verified based on Chi square statistic to reduce candidate sets. Based on this measure,...
1543
  | Authors: Guo Yan Zhang
Chapter 1: Computer Science and Theory, Related Studies
Abstract:Attribute-based encryption scheme is a scheme in which each user is identified by a set of attributes, and some function of those attributes...
38