Anonymity Query Method of Outsourced Database

Article Preview

Abstract:

This paper analyzes the traditional outsourcing model (TOM). Aiming at that TOM has disadvantages such as low security on User Privacy, this paper proposes a new access model in outsourced database. Using the trusted third party (TTP ) makes all operations in the database become anonymous in order to achieve the purpose of user privacy protection.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 798-799)

Pages:

837-841

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Dang T.K.: Information and Security, Vol. 18 (2006), p.85.

Google Scholar

[2] Papadopoulos S, Papadias D, Cheng Wei-wei, et al.: ICDE(Shanghai, China, March 29-April 2, 1997). Vol. 1, p.1148.

Google Scholar

[3] Lanovenko A,P.H. Guo: Proceedings of the World Congress on Engineering and Computer Science (San Francisco, USA, October 24-26, 2007). Vol. 1, p.24.

Google Scholar

[4] Mu Yi, Varadharajan V: Proceedings of the Second International Conference on Cryptology (Chennai, India, December 16-20, 2001). Vol. 1, p.223.

Google Scholar

[5] EI -khoury V, Bennani N, Ouksel A.M.: The First International Conference on Advances in Databases, Knowledge, and Data Applications(Cancun, Mexico, March 1-6, 2009). Vol. 1, p.56.

Google Scholar

[6] Benameur A, Massacci F, Rassadko N.: Proceedings of the 2008 ACM workshop on Secure web services(New York, USA, October 27-31, 2008). Vol. 1, p.45.

DOI: 10.1145/1456492.1456500

Google Scholar