Optimizing TLB for Access Pattern Privacy Protection in Data Outsourcing

Author(s):  
Yao Liu ◽  
Qingkai Zeng ◽  
Pinghai Yuan
Symmetry ◽  
2018 ◽  
Vol 10 (11) ◽  
pp. 637 ◽  
Author(s):  
Tie Hong ◽  
SongZhu Mei ◽  
ZhiYing Wang ◽  
JiangChun Ren

Many scholars have attempted to use an encryption method to resolve the problem of data leakage in data outsourcing storage. However, encryption methods reduce data availability and are inefficient. Vertical fragmentation perfectly solves this problem. It was first used to improve the access performance of the relational database, and nowadays some researchers employ it for privacy protection. However, there are some problems that remain to be solved with the vertical fragmentation method for privacy protection in the relational database. First, current vertical fragmentation methods for privacy protection require the user to manually define privacy constraints, which is difficult to achieve in practice. Second, there are many vertical fragmentation solutions that can meet privacy constraints; however, there are currently no quantitative evaluation criteria evaluating how effectively solutions can protect privacy more effectively. In this article, we introduce the concept of information entropy to quantify privacy in vertical fragmentation, so we can automatically discover privacy constraints. Based on this, we propose a privacy protection model with a minimum entropy fragmentation algorithm to achieve minimal privacy disclosure of vertical fragmentation. Experimental results show that our method is suitable for privacy protection with a lower overhead.


2014 ◽  
Vol 69 (6) ◽  
Author(s):  
Touraj Khodadadi ◽  
A. K. M. Muzahidul Islam ◽  
Sabariah Baharun ◽  
Shozo Komaki

Utilizing database encryption to safeguard data in several conditions where access control is not sufficient is unavoidable. Database encryption offers an extra layer of security to traditional access control methods. It stops users that are unauthorized, such as hackers breaking into a system, and observing private data. Consequently, data is safe even when the database is stolen or attacked. Nevertheless, the process of data decryption and encryption causes degradation in the database performance. In conditions where the entire information is kept in an encrypted format, it is not possible to choose the database content any longer. The data must be first decrypted, and as such, the unwilling and forced tradeoff occurs between the function and the security. The suitable methods to improve the function are techniques that directly deal with the data that is encrypted without having to decrypt them first. In this study, we determined privacy protection and issues that each organization should consider when it decides to outsource own data.  


Author(s):  
Preethi.S

Remote health monitoring and older health care has become a popular application with the advance of wearable medical devices. Privacy protection and intrusion avoidance for cloudlet- based medical data sharing data collected from patients through wearable devices ( such as heartbeat, blood pressure, etc.) must be passed to cloud-run applications to implement various services such as expert advice, emergency assistance, etc. The cloud storage system provides distributed clients with convenient file storage and sharing services. To solve integrity, we present identity based data outsourcing , outsourcing and original auditing concerns about outsourced documents, the program is equipped with an ideal feature that factilitates existing recommendations to protect outsourcing data.


2010 ◽  
Vol 43 (13) ◽  
pp. 77
Author(s):  
MARY ELLEN SCHNEIDER
Keyword(s):  

Author(s):  
Suradej Duangpummet ◽  
Phrimphissa Kraikhun ◽  
Chatrin Phunruangsakao ◽  
Jessada Karnjana ◽  
Masashi Unoki ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document