2010
DOI: 10.1145/1805974.1805978
|View full text |Cite
|
Sign up to set email alerts
|

Combining fragmentation and encryption to protect privacy in data storage

Abstract: The impact of privacy requirements in the development of modern applications is increasing very quickly. Many commercial and legal regulations are driving the need to develop reliable solutions for protecting sensitive information whenever it is stored, processed, or communicated to external parties. To this purpose, encryption techniques are currently used in many scenarios where data protection is required since they provide a layer of protection against the disclosure of personal information, which safeguar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
181
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 172 publications
(181 citation statements)
references
References 14 publications
0
181
0
Order By: Relevance
“…As a third approach -using an arbitrary number of fragments which are all supposed to be known to an attacker -is presented in [8], a formal analysis of this approach in the spirit of Theorem 1 might be another challenging task for future work.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…As a third approach -using an arbitrary number of fragments which are all supposed to be known to an attacker -is presented in [8], a formal analysis of this approach in the spirit of Theorem 1 might be another challenging task for future work.…”
Section: Discussionmentioning
confidence: 99%
“…This view on r and f 2 is referred to as the set of sentences db R containing the sentences (4), (5), (6), (7) and (8).…”
Section: If Item (V) Is Instantiated By Taking the Instancesmentioning
confidence: 99%
“…Therefore, in order to strike a balance between the two. Some of the approach will combine both of two [16], [17]. We briefly describe the approach for hybrid encryption and data fragmentation.…”
Section: Hybrid Of Encryption and Fragmentationmentioning
confidence: 99%
“…In this case, encrypting both names and illnesses may not be necessary. Data fragmentation comes at this point: the use of encryption is limited or avoided by splitting data in di↵erent fragments (e.g., [1,10,11,12,15]). Fragments are computed in such a way that sensitive associations, called confidentiality constraints, are broken.…”
Section: Introductionmentioning
confidence: 99%