Privacy Preserving Updates to Anonymous and Confidential Database (Secure Computing)

Provided by: International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Topic: Data Management Date Added: Jul 2013 Format: PDF
The main theme of secure computing is to provide data security which can be well explained by a simple example. Suppose \"X\" owns a k-anonymous database and needs to determine whether \"X\" database, when inserted with a tuple owned by \"Y\", is still k-anonymous. Clearly, allowing \"X\" to directly read the contents of the tuple breaks the privacy of \"Y\". (e.g., a patient's medical record); in this paper, \"Y\" not get the privacy of own information because the information of \"Y\" can be accessed by \"X\" without the prior knowledge of \"Y\". On the other hand, the confidentiality of the database managed by \"X\" is violated once \"Y\" has access to the contents of database.

Find By Topic