2019
DOI: 10.1007/978-3-030-33752-0_2
|View full text |Cite
|
Sign up to set email alerts
|

SchengenDB: A Data Protection Database Proposal

Abstract: GDPR in Europe and similar regulations, such as the California CCPA, require new levels of privacy support for consumers. Most challenging to IT departments is the "right to be forgotten". Hence, an enterprise must ensure that ALL information about a specific consumer be deleted from enterprise storage, when requested. Since enterprises are internally heavily "siloed", sharing of information is usually accomplished by copying data between systems. This makes finding and deleting all copies of data on a particu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
3

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(18 citation statements)
references
References 2 publications
0
15
0
3
Order By: Relevance
“…[ Kraska et al 2019] describe an end-to-end system, from application requirements to the DBMS, as well as a purpose-based data access model, in which purpose filters act between query execution and retrieval to avoid data leaking to unwanted purposes. These filters are added through bit vectors associated with each tuple.…”
Section: Metadata Explosionmentioning
confidence: 99%
See 3 more Smart Citations
“…[ Kraska et al 2019] describe an end-to-end system, from application requirements to the DBMS, as well as a purpose-based data access model, in which purpose filters act between query execution and retrieval to avoid data leaking to unwanted purposes. These filters are added through bit vectors associated with each tuple.…”
Section: Metadata Explosionmentioning
confidence: 99%
“…GDPRBench [Shastri et al 2020] evaluates this impact by adding a time-to-live attribute to data, and using a daemon or adding this functionality to the DBMS to periodically probe the data in search of TTL violations, as well as deleting them when needed. [Kraska et al 2019] point out that when an entry is deleted in their system, the surrogate keys become dangling, rendering data access impossible. Sypse [Deshpande 2021] proposes the deletion of synthetic data as a form of removal, since it would be impossible to decrypt keys.…”
Section: Delete Guaranteesmentioning
confidence: 99%
See 2 more Smart Citations
“…O ConSQL representa propósitos como conjuntos de dados visto que esse modelo nos permite lidar com os propósitos de maneira simplificada e, como mostram [Kraska et al 2019], é uma maneira de reduzir o espaço de armazenamento ocupado pelos metadados de propósito. Dessa forma, os propósitos definidos para um banco de dados são armazenados em estruturas de dados associadas ao esquema, de modo a permitir a recuperação quando necessário.…”
Section: Definição De Propósitosunclassified