Overview of Privacy Protection Technology Based on Database Application

Article Preview

Abstract:

With the emergence and development of data applications such as database and data mining, how to protect data privacy and prevent disclosure of sensitive information has become one of the major challenges we are facing now. Privacy protection technologies need to protect data privacy without compromising data applications. The research results of privacy protection field are summarized, and the basic principles and features of various types of privacy protection technologies are described. After the in-depth analysis and comparison of existing technologies, this paper points out the future direction of the privacy protection technology.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2816-2821

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Gao AQ, Diao LH. Privacy preservation for attribute order sensitive workload in medical data publishing. Journal of Software, 2009,20(Suppl.) p.314−320.

DOI: 10.1109/itime.2009.5236250

Google Scholar

[2] Chong Zhihong, Ni Weiwei, Liu TengTeng, and Zhang Yong. A privacy-preserving data publishing algorithm for clustering application. Journal of Computer Research and Development,2010,47(12) pp.2083-2089.

Google Scholar

[3] YANG Xiao-Chun, WANG Ya-Zhe, WANG Bin, YU Ge. Privacy preserving approaches for multiple sensitive attributes. Chinese Journal of Computers,2008,31(4) p.574−587

DOI: 10.3724/sp.j.1016.2008.00574

Google Scholar

[4] ZHOU Shui-Geng, LI Feng, Tao Yu-Fei, XIAO Xiao-Kui. Privacy preservation in database applications: a survey. Chinese Journal of Computers,2009,32(4) p.847−861

DOI: 10.3724/sp.j.1016.2009.00847

Google Scholar

[5] Guo YH, Tong YH, Tang SW, Yang DQ. Knowledge hiding in database. Journal of Software, 2007,18(11) p.2782−2799

Google Scholar