Abstract-The data rapidly increases with time. To deal massive data, or called big data, the idea of database as a service has been proposed. Outsourced database provider offers a lot of computing power and storage area. For organizations, they do not need to build their own infrastructure. It can reduce the cost of consumption. However, the data stored in the third-party provider side, if the third party can not be trusted, sensitive data within organization will have leaked crisis. In order to preserve privacy in organization's database, a number of approaches for preserving privacy have been proposed. Although the database has many security problems should be addressed, such as authentication, integrity, access control, and privacy. Also, studies on database need to consider performance efficiently when data updating. But there are huge problems so that we can not address easily. Hence, this paper mainly discusses the recently proposed approaches for preserving privacy only. We classify and organize approaches, and also discuss these. Approaches are divided into two categories, data encryption and data fragmentation. We introduce in simple common approach, give an illustration, and finally discuss challenges for each approach respectively. In the approach of data encryption, we introduce k-anonymity which is a mainstream solution. In data fragmentation, we introduce clustering which is new idea solution. Finally, we summarize these approaches for preserving privacy and discuss research future works.Index Terms-Preserving privacy, outsourced database, database security.
Abstract:Since Taiwan government has announced the New Version of Personal Information Protection Act , People began to pay attention to their personal information and privacy. Many industries significantly increased their responsibilities and faced more serious challenges. In order to cope with the requirements of the new law, BS10012 specification can help enterprises to reduce impact of personal data protection law. Enterprises need to rethink policy objectives, and make risk assessment of personally identifiable information (PII). This study using analytic hierarchy process (AHP) to identify the security level of PII. Corresponding security level with the risk factors of personal information, so that find the suitable countermeasure to protect users PII. Rarely see research about risk assessment of PII by using AHP, therefore the feasibility of the application of AHP in this regard is worthwhile to explore.Keywords: BS10012, personally information, new version of personal information protection act.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.