Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2381716.2381803acmotherconferencesArticle/Chapter ViewAbstractPublication PagescubeConference Proceedingsconference-collections
research-article

Privacy-preserving deletion to generalization-based anonymous database

Published: 03 September 2012 Publication History

Abstract

While creating an anonymous database it is assumed that all data is available at the time of creation. Once record is added to database, it is not deleted or if a user wants to delete person's record from database, it will be removed from it in its next release. Recently there is strong demand for immediate and up-to-date information for anonymous database. Also as anonymous database is derived from original database (nonanonymized), whatever changes made to the original database should be reflected in anonymous database. Bob's tuple should be deleted from Alice's database only if database remains k-anonymous after deletion. Also if tuple deleted from Charles' database it should be removes from Alice database. While performing these operations privacy of data provider (Bob), owner of anonymous database (Alice), and owner of original database (Charles) should be preserved. That is Alice should not know the content of Charles' database and Bob's tuple to be deleted, and Bob and Charles should not have access to Alice database. The existing protocol for updating database does not handle issues of deleting tuple from database. We propose a protocol to address these issues on generalization-based k-anonymous and confidential database by extending the existing protocol for privacy preserving updates to anonymous and confidential database.

References

[1]
A. Trombetta and E. Bertino, "Private Updates to Anonymous Databases," Proc. Int'l Conf. Data Eng. (ICDE), 2006.
[2]
A. Trombetta, W. Jiang, E. Bertino, and L. Bossi, "Privacy-Preserving Updates to Anonymous and Confidential Databases," IEEE Trans. On Dependable and Secure Computing, Vol. 8, No. 4, Jul/Aug 2011.
[3]
B.C.M. Fung, K. Wang, A. W. C. Fu, and J. Pei, "Anonymity for Continuous Data Publishing," Proc. Extending Database Technology Conf. (EDBT), 2008.
[4]
D. Boneh, "The Decision Diffie-Hellman Problem," Proc. Int'l Algorithmic Number Theory Symp., pp. 48--63, 1998.
[5]
D. Boneh, G. di Crescenzo, R. Ostrowsky, and G. Persiano, "Public Key Encryption with Keyword Search," Proc. Eurocrypt Conf., 2004.
[6]
E. Bertino and R. Sandhu, "Database Security---Concepts, Approaches and Challenges," IEEE Trans. Dependable and Secure Computing, vol. 2, no. 1, pp. 2-19, Jan.-Mar. 2005.
[7]
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu, "Anonymizing Tables," Proc. Int'l Conf. Database Theory (ICDT), 2005.
[8]
J.W. Byun, T. Li, E. Bertino, N. Li, and Y. Sohn, "Privacy-Preserving Incremental Data Dissemination," J. Computer Security, vol. 17, no. 1, pp. 43--68, 2009.
[9]
L. Sweeney, "k-Anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557--570, 2002.
[10]
M.J. Freedman, M. Naor, and B. Pinkas, "Efficient Private Matching and Set Intersection," Proc. Eurocrypt Conf., 2004.
[11]
M.K. Reiter and A. Rubin, "Crowds: Anonymity with Web Transactions," ACM Trans. Information and System Security (TISSEC), vol. 1, no. 1, pp. 66--92, 1998.
[12]
M. Reed, P. Syverson, and D. Goldschlag, "Anonymous Connections and Onion Routing," IEEE J. Selected Areas in Comm., vol. 16, no. 4, pp. 482--494, May 1998.
[13]
R. Agrawal, A. Evfimievski, and R. Srikant, "Information Sharing across Private Databases," Proc. ACM SIGMOD Int'l Conf. Management of Data, 2003.
[14]
S. Zhong, Z. Yang, and R. N. Wright, "Privacy-Enhancing k-Anonymization of Customer Data," Proc. ACM Symp. Principles of Database Systems (PODS), 2005.
[15]
U. Maurer, "The Role of Cryptography in Database Security," Proc. ACM SIGMOD Int'l Conf. Management of Data, 2004.

Cited By

View all
  • (2015)Verifiably anonymous data collection on webProceedings of the 2015 International Telecommunication Networks and Applications Conference (ITNAC)10.1109/ATNAC.2015.7366786(38-43)Online publication date: 18-Nov-2015

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
CUBE '12: Proceedings of the CUBE International Information Technology Conference
September 2012
879 pages
ISBN:9781450311854
DOI:10.1145/2381716
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • CUOT: Curtin University of Technology

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 September 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anonymity
  2. database management
  3. privacy
  4. security

Qualifiers

  • Research-article

Conference

CUBE '12
Sponsor:
  • CUOT

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2015)Verifiably anonymous data collection on webProceedings of the 2015 International Telecommunication Networks and Applications Conference (ITNAC)10.1109/ATNAC.2015.7366786(38-43)Online publication date: 18-Nov-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media