scholarly journals A spatial transformation scheme supporting data privacy and query integrity for security of outsourced databases

2013 ◽  
Vol 7 (10) ◽  
pp. 1498-1509 ◽  
Author(s):  
Hyeong-Il Kim ◽  
Al-Amin Hossain ◽  
Jae-Woo Chang
2015 ◽  
Vol 42 (5) ◽  
pp. 652-663 ◽  
Author(s):  
Hyeong-Il Kim ◽  
Young-Ho Song ◽  
Jaewoo Chang

2016 ◽  
pp. 1752-1776
Author(s):  
Min Yoon ◽  
Hyeong-il Kim ◽  
Miyoung Jang ◽  
Jae-Woo Chang

Because much interest in spatial database for cloud computing has been attracted, studies on preserving location data privacy have been actively done. However, since the existing spatial transformation schemes are weak to a proximity attack, they cannot preserve the privacy of users who enjoy location-based services in the cloud computing. Therefore, a transformation scheme is required for providing a safe service to users. We, in this chapter, propose a new transformation scheme based on a line symmetric transformation (LST). The proposed scheme performs both LST-based data distribution and error injection transformation for preventing a proximity attack effectively. Finally, we show from our performance analysis that the proposed scheme greatly reduces the success rate of the proximity attack while performing the spatial transformation in an efficient way.


2014 ◽  
Vol 10 (4) ◽  
pp. 26-49 ◽  
Author(s):  
Min Yoon ◽  
Hyeong-il Kim ◽  
Miyoung Jang ◽  
Jae-Woo Chang

Because much interest in spatial database for cloud computing has been attracted, studies on preserving location data privacy have been actively done. However, since the existing spatial transformation schemes are weak to a proximity attack, they cannot preserve the privacy of users who enjoy location-based services in the cloud computing. Therefore, a transformation scheme is required for providing a safe service to users. We, in this paper, propose a new transformation scheme based on a line symmetric transformation (LST). The proposed scheme performs both LST-based data distribution and error injection transformation for preventing a proximity attack effectively. Finally, we show from our performance analysis that the proposed scheme greatly reduces the success rate of the proximity attack while performing the spatial transformation in an efficient way.


2014 ◽  
Vol 571-572 ◽  
pp. 621-625
Author(s):  
Xiao Lei Zhang ◽  
Yi Tang

Ensuring data privacy and improving query performance are two closely linked challenges for outsourced databases. Using mixed encryption methods to data attributes can reach an explicit trade-off between these two challenges. However, encryption cannot always conceal relations between attributes values. When the data tuples are accessed selectively, inferences based on comparing encrypted values could be launched and sensitive values may be disclosed. In this paper, we explore the attribute based inferences in mixed encrypted databases. We develop a method to construct private indexes on encrypted values to defend against inference while supporting efficient selective access to encrypted data. We have conducted some experiments to validate our proposed method.


2014 ◽  
Vol 10 (4) ◽  
pp. 71-87 ◽  
Author(s):  
Zheli Liu ◽  
Jingwei Li ◽  
Jin Li ◽  
Chunfu Jia ◽  
Jun Yang ◽  
...  

With the development of cloud computing and big data, data privacy protection has become an urgent problem to solve. Data encryption is the most effective way to protect privacy; however, it will change the data format and result in: 1. database structure and application software will be changed; 2. structured query language (SQL) operations cannot work properly, especially in SQL-based fuzzy query. As a result, it is necessary to provide an SQL-based fuzzy query mechanism over encrypted databases, including traditional databases and cloud outsourced databases. This paper establishes a secure database system using format-preserving encryption (FPE) as the underlying primitive to protect the data privacy while not change the database structure. It further proposes a new SQL-based fuzzy query mechanism supporting directly query over encrypted data, which is constructed by FPE and universal hash function (UHF). The security of the proposed mechanism is analyzed as well. In the end, it makes extensive experiments on the system to demonstrate its practical performance.


Author(s):  
P. Sudheer ◽  
T. Lakshmi Surekha

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The  Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.


2018 ◽  
Vol 60 (1) ◽  
pp. 55-65
Author(s):  
Krystyna Ilmurzyńska

Abstract This article investigates the suitability of traditional and participatory planning approaches in managing the process of spatial development of existing housing estates, based on the case study of Warsaw’s Ursynów Północny district. The basic assumption of the article is that due to lack of government schemes targeted at the restructuring of large housing estates, it is the business environment that drives spatial transformations and through that shapes the development of participation. Consequently the article focuses on the reciprocal relationships between spatial transformations and participatory practices. Analysis of Ursynów Północny against the background of other estates indicates that it presents more endangered qualities than issues to be tackled. Therefore the article focuses on the potential of the housing estate and good practices which can be tracked throughout its lifetime. The paper focuses furthermore on real-life processes, addressing the issue of privatisation, development pressure, formal planning procedures and participatory budgeting. In the conclusion it attempts to interpret the existing spatial structure of the estate as a potential framework for a participatory approach.


Sign in / Sign up

Export Citation Format

Share Document