Abstract
Privacy violation has attracted more and more attention from the public, and privacy preservation has become a hot topic in academic communities, industries and societies. Recent research has been focused on purpose-based techniques and models with little consideration on balancing privacy enhancement and performance. We propose an efficient Privacy Aware Partial Index (PAPI) mechanism based on both the concept of purposes and the theory of partial indices. In the PAPI mechanism, all purposes are independent from each other and organized in a flatten purpose tree(\(\mathcal{FPT}\)). Thus, security administrators can update the flatten purpose tree by adding or deleting purposes. Intended purposes are maintained in PAPI directly. Furthermore, based on the PAPI mechanism, we extend the existing query optimizer and executor to enforce the privacy policies. Finally, the experimental results demonstrate the feasibility and efficiency of the PAPI mechanism.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Agrawal, R., Keirnan, J., Srikant, R., Xu, Y.: Hippocratic database. In: Proceedings of the 28th VLDB Conference (2002)
Byun, J.-W., Berino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: Proceedings of the tenth ACM symposium on Access control models and technologies (SACMAT 2005), pp. 102–110 (2005)
Byun, J.-W., Bertino, E.: Vision paper: Micro-views, or on how to protect privacy while enhancing data usability. In: SIGMOD Record (2005) (to be published)
Byun, J.-W., Bertino, E., Li, N.: Purpose based access control for privacy protection in relational dtabase systems. Technical Report 2004-52, Purdue Univ. (2004)
W. W. W. Consortium (W3C). A p3p preference exchange language 1.0 (appel 1.0), Available at: www.zurich.ibm.com/security/enterprise-privacy/epal
Bitton, D., DeWitt, D.J., Turbyfill, C.: Benchmarking database: system a systematic approach. In: Ninth International Conference on Very Large Data Bases, pp. 8–19 (October 1983)
Bitton, D., DeWitt, D.J., Turbyfill, C.: Benchmarking database system a systematic approach. In: Proceeding of CCS 2004, pp. 25–29 (October 2004)
Gasarch, W.: A survey on private information retrieval. The Bulletin of the EATCS 82, 72–107 (2004)
Graef, G.: Query evaluation techniques for large databases. ACM Computing Surveys 25(2), 73–169 (1993)
IBM. The enterprise privacy authorization language (epal), Available at: www.w3.org/TR/P3P-preferences
LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan, R., Xu, Y., DeWitt, D.: Limiting disclosure in hippocratic database. In: The 30th International Conference on Very Large Databases (August 2004)
T. C. C. P. S. Organisations. Common criteria for information technology security evaluation, part 2, draft version 3 and version 2.1-2.3 (August 2005)
Ashley, P., Powers, C.S., Schunter, M.: Privacy, access control, and privacy management. In: Third International Symposium on Electronic Commerce (2002)
Sandhu, R., Chen, F.: The multilevel relational (mlr) data model. ACM Transactions on Information and System Security 1(1), 93–132 (1998)
Selinger, P.G., Astrahan, M.M., Chamberlin, D.d., Lorie, R.A., Price, T.G.: Access path selection in a relational dababase management system. In: Proceedings of the 1979 ACM SIGMOD Conference on the Management of Data (May-June 1979)
Seshadri, P., Swami, A.: Generalized partial indexes. In: Proceedings of the Eleventh International Conference on Data Engineering (ICDE), pp. 420–427 (1995)
Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)
W. W. W. C. (W3C). Platform for privacy preferences (p3p), Available at: http://www.w3.org/P3P
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhan, G., Li, Z., Ye, X., Wang, J. (2006). Privacy Preservation and Protection by Extending Generalized Partial Indices. In: Bell, D.A., Hong, J. (eds) Flexible and Efficient Information Handling. BNCOD 2006. Lecture Notes in Computer Science, vol 4042. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11788911_9
Download citation
DOI: https://doi.org/10.1007/11788911_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-35969-2
Online ISBN: 978-3-540-35971-5
eBook Packages: Computer ScienceComputer Science (R0)