2009
DOI: 10.1007/978-3-642-03007-9_15
|View full text |Cite
|
Sign up to set email alerts
|

Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients

Abstract: Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but-curious" servers are typically based on an overlying layer of encryption that is applied on the whole information, or use a combination of fragmentation and encryption. The computational load imposed by encryption makes such approaches not suitable for scenarios with lightweight clients. In this paper, we address this issue and propose a novel model for enforcing privacy requirements on the outsourced informati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 26 publications
(24 citation statements)
references
References 13 publications
0
24
0
Order By: Relevance
“…Literature [8] summarized the privacy of research results in the field, and described the basic principles of privacy protection technologies, then pointed out the future direction of privacy protection technologies. Literature [9][10][11] had effective combination confidential information and data decomposition. They proposed to achieve information decomposition using the concept of privacy constraints, which describe the data attributes needing to be encrypted and simultaneously back to the privacy of the data leaked.…”
Section: Related Workmentioning
confidence: 99%
“…Literature [8] summarized the privacy of research results in the field, and described the basic principles of privacy protection technologies, then pointed out the future direction of privacy protection technologies. Literature [9][10][11] had effective combination confidential information and data decomposition. They proposed to achieve information decomposition using the concept of privacy constraints, which describe the data attributes needing to be encrypted and simultaneously back to the privacy of the data leaked.…”
Section: Related Workmentioning
confidence: 99%
“…2. The final method proposed for outsourcing data as plaintext was introduced in [6,5]. This method, similar to the method in [1] divides the data into two fragments.…”
Section: Previous Solutionsmentioning
confidence: 99%
“…The solution in [6,5] describes a scheme that relies on that the data owner to maintain a significant portion of the data. The amount of storage needed to store a single fragment only differs from storing the entire database by a constant factor.…”
Section: Problem Definitionmentioning
confidence: 99%
See 2 more Smart Citations