Design and Implementation of a Privacy-Preserving Database on PDC
نویسنده
چکیده
Regulating access to electronically stored personal information is an increasingly challenging task and significant concerns about the privacy of personal data have emerged. These concerns are fueled, in part, by the ever-growing number of highly-publicized security incidents involving data theft and privacy violations. As the most recent example, UC Berkeley has discovered that foreign attackers breached the databases maintained by the University Health Services and gained unauthorized access to large volumes of personal data including names, birth dates, and social security numbers [5]. As a consequence of this security breach, approximately 160,000 current and former University students have been exposed to the risk of identity theft. One of the defining principles of information privacy is the notion of limited disclosure, which stipulates that individuals and organizations should have control over who is allowed to see their private information and for what purpose. Such information may not be revealed for purposes other than those for which there is consent from the owner of the information. The issues of privacy and information disclosure in database management systems have received a significant amount of research attention. In the context of relational databases, the principle of limited disclosure implies that the personal information stored in a database may be revealed to database users through queries only in accordance with the privacy preferences specified by the owner of this information. These preferences are essentially a set of rules that describe to whom data may be disclosed (recipients) and how it may be used (purposes). [2] proposes re-architecting our database management systems to include responsibility for the privacy of data as a fundamental tenet. This paper outlines the ten principles for privacypreserving (Hippocratic) databases which include, among others, purpose specification, consent, and limited disclosure. In [4], the authors demonstrate how the limited disclosure principle can be realized within the confines of a traditional RDBMS architecture. In the table semantics model of limited disclosure, each 〈Purpose,Recipient〉 pair is conceptually assigned a unique view over the entire database, in which prohibited attributes are masked with the NULL value. To implement these semantics, the authors propose storing the privacy preferences (and other policy metadata) in relational form and modifying incoming queries with CASE statements to enforce the rules and conditions expressed in the privacy metadata. While this approach is undoubtedly attractive due to its simplicity and ease of implementation, a purely database-level solution would only partially address the major security challenges. An unscrupulous user with administrative privileges can easily disable or circumvent the query rewriting mechanisms, for example by reading the raw (unfiltered) table contents directly from the database files in the underlying filesystem. Furthermore, the output of a query submitted on behalf
منابع مشابه
An Effective Method for Utility Preserving Social Network Graph Anonymization Based on Mathematical Modeling
In recent years, privacy concerns about social network graph data publishing has increased due to the widespread use of such data for research purposes. This paper addresses the problem of identity disclosure risk of a node assuming that the adversary identifies one of its immediate neighbors in the published data. The related anonymity level of a graph is formulated and a mathematical model is...
متن کاملDifferentially Private Local Electricity Markets
Privacy-preserving electricity markets have a key role in steering customers towards participation in local electricity markets by guarantying to protect their sensitive information. Moreover, these markets make it possible to statically release and share the market outputs for social good. This paper aims to design a market for local energy communities by implementing Differential Privacy (DP)...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملA centralized privacy-preserving framework for online social networks
There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...
متن کاملSeparating indexes from data: a distributed scheme for secure database outsourcing
Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...
متن کاملSecure and Privacy-Preserving DRM for Mobile Devices with Web Service Security∗ – An Experience Report –
Preserving the customer’s privacy has to be a major concern when implementing a commercial DRM system. In [12] a privacy-preserving digital rights management (DRM) architecture based on the widely used Open Mobile Alliance (OMA) DRM [17] specification for mobile devices has been suggested. In this paper the design of a possible implementation of the proposed architecture is explained which uses...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009