Browse > Article
http://dx.doi.org/10.7236/IJIBC.2021.13.1.82

Secure Healthcare Management: Protecting Sensitive Information from Unauthorized Users  

Ko, Hye-Kyeong (Department of Computer Engineering, Sungkyul University)
Publication Information
International Journal of Internet, Broadcasting and Communication / v.13, no.1, 2021 , pp. 82-89 More about this Journal
Abstract
Recently, applications are increasing the importance of security for published documents. This paper deals with data-publishing where the publishers must state sensitive information that they need to protect. If a document containing such sensitive information is accidentally posted, users can use common-sense reasoning to infer unauthorized information. In recent studied of peer-to-peer databases, studies on the security of data of various unique groups are conducted. In this paper, we propose a security framework that fundamentally blocks user inference about sensitive information that may be leaked by XML constraints and prevents sensitive information from leaking from general user. The proposed framework protects sensitive information disclosed through encryption technology. Moreover, the proposed framework is query view security without any three types of XML constraints. As a result of the experiment, the proposed framework has mathematically proved a way to prevent leakage of user information through data inference more than the existing method.
Keywords
Information Inference; XML Constraints; Privacy Preserving; Query-View Secure;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. H. Yoon, K. S. Lee, C. J. Sang, T. Khudaybergenov, M. S. Kim, D. G. Woo, and J. U. Kim, "Building Control Box Attached Monitor based Color Grid Recognition Methods for User Access Authentication," The International Journal of Internet, Broadcasting and Communication (IJIBC), Vol. 12, No. 2, pp. 1-7, 2020. DOI: https://doi.org/10.7236/JIJBC.2020.12.2.1.   DOI
2 Y. Seo and Y. Chang, "A Study for Applicating and Introducing the Right to be Forgotten," The Journal of Convergence on Culture Technology (JCCT), Vol. 2, No. 3, pp. 23-28, 2016. DOI: https://doi.org/10.17703/JCCT.2016.2.3.23.   DOI
3 D. Dobkin, A. K. Jones, and R. J. Lipton, "Secure Databases: Protection against User Influence," ACM Trans. Database System, Vol. 4, No. 1, pp. 97-106, 1979. DOI: https://doi.org/10.1145/320064.320068.   DOI
4 A. Brodskyand, C. Farkas, and S. Jajodia, "Secure Databases: Constraints, Inference Channels, and monitoring disclosures," IEEE Transactions on Knowledge and Data Engineering, Vol. 12, No. 6, pp. 900-919, 2000. DOI: https://doi.org/10.1016/b978-012088469-8.50012-7.   DOI
5 W. S. Ng, K. L, Tan, and A. Zhou, "A P2P-based System for Distributed Data Sharing," in Proc. 19th International Conference on Data Engineering, pp. 633-644, 2003. DOI: https://doi.org/10.1109/icde.2003.1260827.   DOI
6 M. Stonebraker, P. M. Aoki, W. Litwin, A. Pfeffer, A. Sah, J. Sidell, Staelin, and A. Yu, "Mariposa: A Wide-area Distributed Database System," VLDB Journal, Vol. 5, No. 1, pp. 48-63, 1996. DOI: https://doi.org/10.3850/978-981-08-7300-4_1005.   DOI
7 Z. G. Ives, A. Y. Lyer J. Madhavan, R. Pottinger. S. Saroiu, I. Tatarinov, S. Betzler, Q. Chen, E. Jaslikowska, J. Su, and W. Yeung, "Self-organizing Data Sharing Communities with SAGRES," in Proc. 2003 ACM SIGMOD International Conference on Management of Data, p. 582, June, 2000. OI: https://doi.org/10.1145/342009.335492.   DOI
8 T. Bray, J. Paoli, C. M. Sperberg-McQueen, E. Maler, and F. Yergeau, "Extensible Markup Language (XML) 1.0 (forth ed.)," W3C, 2006, http://www.w3.org/TR/REC-xml.
9 N. R. Adam and J. C. Wortman, "Security-Control Methods for Statistical Databases," ACM Computing Surveys, Vol. 21, No. 4, pp. 515-556, 1989. DOI: https://doi.org/10.1145/76894.76895.   DOI
10 X. Yang and C. Li, "Secure XML Publishing without Information Leakage in the Presence of Data Inference," in Proc. 30th International Conference on Very Large Data Bases, pp. 96-107, 2004. DOI: https://doi.org/10.1016/b978-012088469-8.50012-7.   DOI
11 E. Bertino, S. Castano, E. Ferrari, and M. Mesiti, "Controlling Access and Dissemination of XML Document," in Proc. 2nd International Workshop on Web Information and Data Management, pp. 22-27, 1999. DOI: https://doi.org/10.1145/319759.319770.   DOI
12 S. Castano M. G. Fugini and G. Martella, "Database Security," Addison-Wesley & ACM Press, 1995.
13 G. Miklau and D. Suciu, "Controlling Access to Published Data using Cryptography," in Proc. 29th International Conference on Very Large Data Bases, pp. 898-909, 2003. DOI: https://doi.org/10.1016/b978-012722442-8/50084-7.   DOI
14 J. G. Lee and K. Y. Whang, "Secure Query Processing against Encrypted XML Data using Query-Aware Decryption," Information Sciences, Vol. 176, No. 13, pp. 1928-1947, 2006. DOI: https://doi.org/10.1016/j.ins.2005.08.001.   DOI
15 H. Ko and S. Lee, "A Binary String Approach for Updates in Dynamic Ordered XML Data," IEEE Transactions on Knowledge and Data Engineering," Vol. 22, No. 4, pp. 602-607, 2010. DOI: https://doi.org/10.1109/tkde.2009.87.   DOI