Browse > Article
http://dx.doi.org/10.3745/KTCCS.2016.5.9.217

Efficient Data Publishing Method for Protecting Sensitive Information by Data Inference  

Ko, Hye-Kyeong (성결대학교 컴퓨터공학부)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.5, no.9, 2016 , pp. 217-222 More about this Journal
Abstract
Recent research on integrated and peer-to-peer databases has produced new methods for handling various types of shared-group and process data. This paper with data publishing, where the publisher needs to specify certain sensitive information that should be protected. The proposed method cannot infer the user's sensitive information is leaked by XML constraints. In addition, the proposed secure framework uses encrypt to prevent the leakage of sensitive information from authorized users. In this framework, each node of sensitive data in an eXtensible Markup Language (XML) document is encrypted separately. All of the encrypted data are moved from their original document, and are bundled with an encrypted structure index. Our experiments show that the proposed framework prevents information being leaked via data inference.
Keywords
Data; Encrypted Structure Index; Sensitive Information; Inference; Data Publishing;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Z. G. Ives, A. Y. Lyer, J. Madhavan, R. Pottinger S. Saroiu, I. Tatarinov, S. betzler, Q. Chen, E. Jaslikowska, J. Su, and W. Yeung, "Self-Organizing Data Sharing Communities with SAGRES," in of the 2003 ACM SIGMOD International Conference on Management of Data, p.582, 2003.
2 W. S. Ng, B. C. Ooi, K. L. Tan, and A. Zhou, "A P2P-based System for Distributed Data Sharing," in Proceedings. of 19th International Conference on Data Management, pp.633-644, 2003.
3 M. Stonebraker, P. M. Aoki, W. Litwin, A. Pfeffer, A. Sah, J. Sidell, Staelin, and A. Yu, "Mariposa: A Wide-area Distributed Database System," VLDB Journal, Vol.5, No.1, pp.48-63, 1996.   DOI
4 Extensible Markup Language (XML) 1.0 [Internet], http://www.w3.org/TR/REC-xml.
5 E. Bertino, S. Castano, E. Ferrari, and M. Mesiti, "Controlling Access and Dissemination of XML Document," in Proceedings of 2nd International Workshop on Web Information and Data Management, pp.22-27, 1999.
6 X. Yang and C. Li, "Secure XML Publishing without Information Leakage in the Presence of Data Inference," in Proceedings of the 30th International Conference on Very Large Data Bases, pp.96-107, 2004.
7 J. G. Lee and K. Y. Whang, "Secure Query Processing against Encrypted XML Data Using Query-Aware Decryption," Information Science, Vol.176, No.13, pp.1928-1947, 2006.   DOI
8 G. Miklau and D. Suciu, "Controlling Access to Published Data Using Cryptography," in Proceedings. of the 29th International Conference on Very Large Data Bases, pp.898-909, 2003.
9 H.-K. Ko and S. Lee, "A Binary String Approach for Updates in Dynamic Ordered XML Data," IEEE Transactions on Knowledge and Data Engineering, Vol.22, No.4, pp.602-607, 2010.   DOI
10 IBM XML Security Suite [Internet], http://www.alphaworks.ibm.com/xmlsecuritysuite.
11 J. Dacmen and V. Rijmen, "The Block Cipher Rijndael," in Proceedings of the International Conference on Smart Card Research and Applications, pp.277-284, 1998.
12 A. Schmidt, F. Wass. M. L. Kersten, M. J. Carey, L. Manolescu, and R. Busse, "A Benchmark for XML Data Management," in Proceedings. of 28th International Conference on Very Large Data Bases, pp.974-985, 2002.
13 XML Path Language (XPath) [Internet], http://www.w3.org/TR/1999/REC-xpath-19991116.