Updating outsourced anatomized private databases
Author | Nergiz, Ahmet Erhan |
Author | Clifton, Chris |
Author | Malluhi, Qutaibah M. |
Available date | 2024-07-17T07:14:39Z |
Publication Date | 2013 |
Publication Name | ACM International Conference Proceeding Series |
Resource | Scopus |
Identifier | http://dx.doi.org/10.1145/2452376.2452399 |
Abstract | We introduce operations to safely update an anatomized database. The result is a database where the view of the server satisfies standards such as k-anonymity or l-diversity, but the client is able to query and modify the original data. By exposing data where possible, the server can perform value-added services such as data analysis not possible with fully encrypted data, while still being unable to violate privacy constraints. Update is a key challenge with this model; nave application of insertion and deletion operations reveals the actual data to the server. This paper shows how data can be safely inserted, deleted, and updated. The key ideas are that data is inserted or updated into an encrypted temporary table until enough data is available to safely decrypt, and that sensitive information of deleted tuples is left behind to ensure privacy of both deleted and undeleted individuals. This approach is proven effective in maintaining the privacy constraint against an adversarial server. The paper also gives empirical results on how much data remains encrypted, and the resulting quality of the server's (anatomized) view of the data, for various update and delete rates. |
Language | en |
Publisher | Association for Computing Machinery |
Subject | H.2.4 [Database Management]: Systems - Relational databases H.2.7 [Database Management]: Database Administration - Security, integrity, and protection |
Type | Conference |
Pagination | 179-190 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
-
Computer Science & Engineering [2402 items ]