Privacy-Preserving Updates to Anonymous and Confidential Databases

Download Now
Provided by: IJAIR
Topic: Security
Format: PDF
Suppose alice owns a k-anonymous database and needs to determine whether the user database, when inserted with a tuple owned by bob, is still k-anonymous. Also, suppose that access to the database is strictly controlled, because for example data are used for certain experiments that need to be maintained confidential. Clearly, allowing alice to directly read the contents of the tuple breaks the privacy of bob (e.g., a patient's medical record); on the other hand, the confidentiality of the database managed by alice is violated once bob has access to the contents of the database.
Download Now

Find By Topic