Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data 2010
DOI: 10.1145/1807167.1807219
|View full text |Cite
|
Sign up to set email alerts
|

Load-balanced query dissemination in privacy-aware online communities

Abstract: We propose a novel privacy-preserving distributed infrastructure in which data resides only with the publishers owning it. The infrastructure disseminates user queries to publishers, who answer them at their own discretion. The infrastructure enforces a publisher kanonymity guarantee, which prevents leakage of information about which publishers are capable of answering a certain query. Given the virtual nature of the global data collection, we study the challenging problem of efficiently locating publishers in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 45 publications
0
5
0
Order By: Relevance
“…Specifically, provider p possesses a depository of private documents, D(p), on which a role-based access control policy is enforced. We assume that each document d can be described by a set of content descriptors (CD), denoted by T (d) [5] (e.g., keywords), from a finite set of CDs T . Provider p can summarizes its local data and access policy by bitmap b(p), where each column is associated with a role o and each row with a content descriptor or term t. The cell at column o and row t is a bit, with 1 meaning provider p has one or more documents matched to term t and accessible to subject role with o, and 0 otherwise.…”
Section: Architecture Of Role-sensitive Ppimentioning
confidence: 99%
See 4 more Smart Citations
“…Specifically, provider p possesses a depository of private documents, D(p), on which a role-based access control policy is enforced. We assume that each document d can be described by a set of content descriptors (CD), denoted by T (d) [5] (e.g., keywords), from a finite set of CDs T . Provider p can summarizes its local data and access policy by bitmap b(p), where each column is associated with a role o and each row with a content descriptor or term t. The cell at column o and row t is a bit, with 1 meaning provider p has one or more documents matched to term t and accessible to subject role with o, and 0 otherwise.…”
Section: Architecture Of Role-sensitive Ppimentioning
confidence: 99%
“…More importantly, its publishing process is vulnerable to colluding attacks, specially in the case of an innocent provider ending up with its predecessor and successor both being malicious. Another possible technique can be used is the generic secure multi-party computation [5] which consumes considerable computation overheads.…”
Section: Secure Group Aggregation: Design Rationalementioning
confidence: 99%
See 3 more Smart Citations