Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing

نویسندگان

  • Nicholas L. Farnan
  • Adam J. Lee
  • Panos K. Chrysanthis
  • Ting Yu
چکیده

In a centralized setting, the declarative nature of SQL is a major strength: a user can simply describe what she wants to retrieve, and need not worry about how the resulting query plan is actually generated and executed. However, in a decentralized setting, two query plans that produce the same result might actually reveal vastly different information about the intensional description of a user’s query to the servers participating its evaluation. In cases where a user considers portions of her query to be sensitive, this is clearly problematic. In this paper, we address the specification and enforcement of querier privacy constraints on the execution of distributed database queries. We formalize a notion of intensional query privacy called (I,A)-privacy, and extend the syntax of SQL to allow users to enforce strict (I,A)-privacy constraints or partially ordered privacy/performance preferences over the execution of

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preventing Dns Based Botnet Communication for Ddos Attack

The collection of infected systems called botnet which is controlled by the one named as bot master. Botnets are capable to initiate many DoS attacks. Denial of Service attack (DoS) is attempted by the attacker to prevent legal user and in Distributed Denial of Service attack (DDoS) the attacker sends more number of unwanted request at the same time to infect particular host. The botnet control...

متن کامل

Privacy-Preserving Location-Based Query Using Location Indexes and Parallel Searching in Distributed Networks

An efficient location-based query algorithm of protecting the privacy of the user in the distributed networks is given. This algorithm utilizes the location indexes of the users and multiple parallel threads to search and select quickly all the candidate anonymous sets with more users and their location information with more uniform distribution to accelerate the execution of the temporal-spati...

متن کامل

From the Editor: Security Community--Blurring the Line between Authentication and Identification

I have numerous customer cards. I don't use them to identify myself as a private person but rather to build and maintain a profile. I earn (too many) frequent-flyer miles, I get a (very small) discount when I shop for groceries, and so on. Companies add a financial advantage to the convenience, and I choose to take advantage of it. But if I drop by my local shop to buy contraceptives, I refrain...

متن کامل

Enhanced Network Based Query Processing in Road networks

The location aware portable devices are widely increased. This rise to the usage of location based services to reveal their own location and needed location. The existing query processing techniques uses the private information of the user. It threatens the user identity, privacy and confidentiality. To overcome this, instead of spatial region with one query reference point to process the query...

متن کامل

Protecting location privacy and query privacy: a combined clustering approach

In this paper, a combined clustering algorithm namely enhanced clustering cloak (ECC), for protecting location privacy and query privacy is proposed. An iterative K-means clustering method is developed to group the user requests into clusters for providing location safety. Meanwhile, a hierarchical clustering method for preserving the query privacy is used when creating clusters. ECC provides u...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011