2012
DOI: 10.3233/jcs-2012-0449
|View full text |Cite
|
Sign up to set email alerts
|

An OBDD approach to enforce confidentiality and visibility constraints in data publishing*

Abstract: With the growing needs for data sharing and dissemination, privacy-preserving data publishing is becoming an important issue that still requires further investigation. In this paper, we make a step towards private data publication by proposing a solution based on the release of vertical views (fragments) over a relational table that satisfy confidentiality and visibility constraints expressing requirements for information protection and release, respectively. We translate the problem of computing a fragmentati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2014
2014
2015
2015

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 18 publications
(15 citation statements)
references
References 30 publications
0
15
0
Order By: Relevance
“…In [3] the author had proposed a data fragmentation method to meet the requirement. The proposed data fragmentation method in this paper improves the data manipulation process, storage optimization, and facilitates data distribution and data security.…”
Section: Background Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [3] the author had proposed a data fragmentation method to meet the requirement. The proposed data fragmentation method in this paper improves the data manipulation process, storage optimization, and facilitates data distribution and data security.…”
Section: Background Workmentioning
confidence: 99%
“…In addition, they attach unencrypted attributes subject to confidentiality constraints in order to allow for efficient selection operations without searchable encryption technique was explained in [3]. Depending on the actual queries, different attribute combinations need to be revealed, resulting in data redundancies.…”
Section: Background Workmentioning
confidence: 99%
“…Function Re_Assign receives as input the set To_Empty of non-empty but underquota groups, and tries to reallocate their tuples to other groups (lines [30][31][32][33][34][35][36][37][38]. Tuples in under-quota groups that cannot be reallocated will be removed from the fragmentation and are inserted into To_Remove (lines [39][40].…”
Section: Computing a K-loose Associationmentioning
confidence: 99%
“…The algorithm then deletes from each fragment both the tuples that have never been assigned to groups and the tuples returned by function Re_Assign (lines [29][30].…”
Section: Computing a K-loose Associationmentioning
confidence: 99%
See 1 more Smart Citation