Abstract
Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Also, suppose that access to the database is strictly controlled, because for example data are used for certain experiments that need to be maintained confidential. Clearly, allowing Alice to directly read the contents of the tuple breaks the privacy of Bob (e.g., a patient's medical record); on the other hand, the confidentiality of the database managed by Alice is violated once Bob has access to the contents of the database. Thus, the problem is to check whether the database inserted with the tuple is still k-anonymous, without letting Alice and Bob know the contents of the tuple and the database, respectively. in this paper, we propose two protocols solving this problem on suppression-Based and generalization-Based k-anonymous and confidential databases. the protocols rely on well-known cryptographic assumptions, and we provide theoretical analyses to proof their soundness and experimental results to illustrate their efficiency. © 2011 IEEE.
Recommended Citation
A. Trombetta et al., "Privacy-preserving Updates to Anonymous and Confidential Databases," IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 4, pp. 578 - 587, article no. 5654511, Institute of Electrical and Electronics Engineers, Jan 2011.
The definitive version is available at https://doi.org/10.1109/TDSC.2010.72
Department(s)
Computer Science
Keywords and Phrases
anonymity; data management; Privacy; secure computation.
International Standard Serial Number (ISSN)
1545-5971
Document Type
Article - Journal
Document Version
Citation
File Type
text
Language(s)
English
Rights
© 2024 Institute of Electrical and Electronics Engineers, All rights reserved.
Publication Date
01 Jan 2011