Show simple item record

AuthorNergiz, Ahmet Erhan
AuthorClifton, Chris
AuthorMalluhi, Qutaibah M.
Available date2024-07-17T07:14:39Z
Publication Date2013
Publication NameACM International Conference Proceeding Series
ResourceScopus
Identifierhttp://dx.doi.org/10.1145/2452376.2452399
URIhttp://hdl.handle.net/10576/56732
AbstractWe introduce operations to safely update an anatomized database. The result is a database where the view of the server satisfies standards such as k-anonymity or l-diversity, but the client is able to query and modify the original data. By exposing data where possible, the server can perform value-added services such as data analysis not possible with fully encrypted data, while still being unable to violate privacy constraints. Update is a key challenge with this model; nave application of insertion and deletion operations reveals the actual data to the server. This paper shows how data can be safely inserted, deleted, and updated. The key ideas are that data is inserted or updated into an encrypted temporary table until enough data is available to safely decrypt, and that sensitive information of deleted tuples is left behind to ensure privacy of both deleted and undeleted individuals. This approach is proven effective in maintaining the privacy constraint against an adversarial server. The paper also gives empirical results on how much data remains encrypted, and the resulting quality of the server's (anatomized) view of the data, for various update and delete rates.
Languageen
PublisherAssociation for Computing Machinery
SubjectH.2.4 [Database Management]: Systems - Relational databases
H.2.7 [Database Management]: Database Administration - Security, integrity, and protection
TitleUpdating outsourced anatomized private databases
TypeConference Paper
Pagination179-190


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record