Privacy constraint processing in a privacy-enhanced database management system

نویسنده

  • Bhavani M. Thuraisingham
چکیده

This paper views the privacy problem as a form of inference problem. It first provides an overview of the privacy problem and then introduces the notion of privacy constraints. Next it describes architecture for a privacy-enhanced database management system and discusses algorithms for privacy constraint processing. A note on privacy constraints processing and release control are given next. Finally some directions for future research on privacy are stated. 2005 Published by Elsevier B.V.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Autonomic Databases: Towards Privacy Enhanced Database Management Systems

Heteronomy – the lack of self-determination expresses exactly how our personal data are often treated by organizations. Inspired by the tenet of autonomy from Immanuel Kant, we argue that future database systems must provide autonomy for individuals regarding the privacy of their data. We identify privacy invasive technology and existing privacy enhancing technology. We argue that despite the e...

متن کامل

Exploring personalized life cycle policies

Ambient Intelligence imposes many challenges in protecting people’s privacy. Storing privacy-sensitive data during for permanently will inevitably result in privacy violations. Limited retention techniques might prove useful in order to limit the risks of unwanted and irreversible disclosure of privacy-sensitive data. To overcome the rigidness of simple limited retention policies, Life-Cycle po...

متن کامل

Privacy-Preserving Data Mining: Development and Directions

This article first describes the privacy concerns that arise due to data mining, especially for national security applications. Then we discuss privacy-preserving data mining. In particular, we view the privacy problem as a form of inference problem and introduce the notion of privacy constraints. We also describe an approach for privacy constraint processing and discuss its relationship to pri...

متن کامل

Query Processing with K-Anonymity

Anonymization techniques are used to ensure the privacy preservation of the data owners, especially for personal and sensitive data. While in most cases, data reside inside the database management system; most of the proposed anonymization techniques operate on and anonymize isolated datasets stored outside the DBMS. Hence, most of the desired functionalities of the DBMS are lost, e.g., consist...

متن کامل

A Constraint-Based Framework for Computing Privacy Preserving OLAP Aggregations on Data Cubes

A constraint-based framework for computing privacy preserving OLAP aggregations on data cubes is proposed and experimentally assessed in this paper. Our framework introduces a novel privacy OLAP notion, which, following consolidated paradigms of OLAP research, looks at the privacy of aggregate patterns defined on multidimensional ranges rather than the privacy of individual tuples/data-cells, l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Data Knowl. Eng.

دوره 55  شماره 

صفحات  -

تاریخ انتشار 2005