scholarly journals Query Processing in Private Data Outsourcing Using Anonymization

Author(s):  
Ahmet Erhan Nergiz
Author(s):  
Sabrina De Capitani di Vimercati ◽  
Sara Foresti ◽  
Stefano Paraboschi ◽  
Gerardo Pelosi ◽  
Pierangela Samarati

2014 ◽  
Vol 69 (6) ◽  
Author(s):  
Touraj Khodadadi ◽  
A. K. M. Muzahidul Islam ◽  
Sabariah Baharun ◽  
Shozo Komaki

Utilizing database encryption to safeguard data in several conditions where access control is not sufficient is unavoidable. Database encryption offers an extra layer of security to traditional access control methods. It stops users that are unauthorized, such as hackers breaking into a system, and observing private data. Consequently, data is safe even when the database is stolen or attacked. Nevertheless, the process of data decryption and encryption causes degradation in the database performance. In conditions where the entire information is kept in an encrypted format, it is not possible to choose the database content any longer. The data must be first decrypted, and as such, the unwilling and forced tradeoff occurs between the function and the security. The suitable methods to improve the function are techniques that directly deal with the data that is encrypted without having to decrypt them first. In this study, we determined privacy protection and issues that each organization should consider when it decides to outsource own data.  


2012 ◽  
Vol 2 (4) ◽  
pp. 152-153 ◽  
Author(s):  
Sudhakara Reddy Mallidi ◽  
◽  
Gottipalla Ashok Kumar

2016 ◽  
Vol 136 (4) ◽  
pp. 576-587 ◽  
Author(s):  
Hideki Sato ◽  
Takayuki Usami

2018 ◽  
Vol 5 (4) ◽  
pp. 7
Author(s):  
I. JENCY ◽  
Keyword(s):  

2005 ◽  
Vol 10 (5) ◽  
pp. 9-38 ◽  
Author(s):  
Say Ying Lim ◽  
David Taniar ◽  
Bala Srinivasan
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document