Maintaining database anonymity in the presence of queries
Author | Riley, Ryan |
Author | Clifton, Chris |
Author | Malluhi, Qutaibah |
Available date | 2024-07-17T07:14:52Z |
Publication Date | 2013 |
Publication Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
Resource | Scopus |
Identifier | http://dx.doi.org/10.1007/978-3-642-41098-7_3 |
ISSN | 3029743 |
Abstract | With the advent of cloud computing there is an increased interest in outsourcing an organization's data to a remote provider in order to reduce the costs associated with self-hosting. If that database contains information about individuals (such as medical information), it is increasingly important to also protect the privacy of the individuals contained in the database. Existing work in this area has focused on preventing the hosting provider from ascertaining individually identifiable sensitive data from the database, through database encryption or manipulating the data to provide privacy guarantees based on privacy models such as k-anonymity. Little work has been done to ensure that information contained in queries on the data, in conjunction with the data, does not result in a privacy violation. In this work we present a hash based method which provably allows the privacy constraint of an unencrypted database to be extended to the queries performed on the database. In addition, we identify a privacy limitation of such an approach, describe how it could be exploited using a known-query attack, and propose a counter-measure based on oblivious storage. |
Language | en |
Publisher | Springer |
Subject | Database encryption K-Anonymity Medical information Privacy constraints Privacy models Privacy violation Sensitive datas Data privacy Digital storage Query processing Query languages |
Type | Conference Paper |
Pagination | 33-48 |
Volume Number | 8203 LNCS |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
-
Computer Science & Engineering [2402 items ]