• 中文核心期刊要目总览
  • 中国科技核心期刊
  • 中国科学引文数据库(CSCD)
  • 中国科技论文与引文数据库(CSTPCD)
  • 中国学术期刊文摘数据库(CSAD)
  • 中国学术期刊(网络版)(CNKI)
  • 中文科技期刊数据库
  • 万方数据知识服务平台
  • 中国超星期刊域出版平台
  • 国家科技学术期刊开放平台
  • 荷兰文摘与引文数据库(SCOPUS)
  • 日本科学技术振兴机构数据库(JST)
Iuon-Chang Lin, Yang-Te Lee, Chen-Yang Cheng. (r, QI)-Transform:Reversible Data Anonymity Based on Numeric Type of Data in Outsourced Database[J]. 电子科技大学(英文版), 2017, 15(3): 222-230. DOI: 10.11989/JEST.1674-862X.60804020
引用本文: Iuon-Chang Lin, Yang-Te Lee, Chen-Yang Cheng. (r, QI)-Transform:Reversible Data Anonymity Based on Numeric Type of Data in Outsourced Database[J]. 电子科技大学(英文版), 2017, 15(3): 222-230. DOI: 10.11989/JEST.1674-862X.60804020
Iuon-Chang Lin, Yang-Te Lee, Chen-Yang Cheng. (r, QI)-Transform:Reversible Data Anonymity Based on Numeric Type of Data in Outsourced Database[J]. Journal of Electronic Science and Technology, 2017, 15(3): 222-230. DOI: 10.11989/JEST.1674-862X.60804020
Citation: Iuon-Chang Lin, Yang-Te Lee, Chen-Yang Cheng. (r, QI)-Transform:Reversible Data Anonymity Based on Numeric Type of Data in Outsourced Database[J]. Journal of Electronic Science and Technology, 2017, 15(3): 222-230. DOI: 10.11989/JEST.1674-862X.60804020

(r, QI)-Transform:Reversible Data Anonymity Based on Numeric Type of Data in Outsourced Database

(r, QI)-Transform:Reversible Data Anonymity Based on Numeric Type of Data in Outsourced Database

  • 摘要: An outsource database is a database service provided by cloud computing companies. Using the outsource database can reduce the hardware and software's cost and also get more efficient and reliable data processing capacity. However, the outsource database still has some challenges. If the service provider does not have sufficient confidence, there is the possibility of data leakage. The data may has user's privacy, so data leakage may cause data privacy leak. Based on this factor, to protect the privacy of data in the outsource database becomes very important. In the past, scholars have proposed k-anonymity to protect data privacy in the database. It lets data become anonymous to avoid data privacy leak. But k-anonymity has some problems, it is irreversible, and easier to be attacked by homogeneity attack and background knowledge attack. Later on, scholars have proposed some studies to solve homogeneity attack and background knowledge attack. But their studies still cannot recover back to the original data. In this paper, we propose a data anonymity method. It can be reversible and also prevent those two attacks. Our study is based on the proposed r-transform. It can be used on the numeric type of attributes in the outsource database. In the experiment, we discussed the time required to anonymize and recover data. Furthermore, we investigated the defense against homogeneous attack and background knowledge attack. At the end, we summarized the proposed method and future researches.

     

    Abstract: An outsource database is a database service provided by cloud computing companies. Using the outsource database can reduce the hardware and software's cost and also get more efficient and reliable data processing capacity. However, the outsource database still has some challenges. If the service provider does not have sufficient confidence, there is the possibility of data leakage. The data may has user's privacy, so data leakage may cause data privacy leak. Based on this factor, to protect the privacy of data in the outsource database becomes very important. In the past, scholars have proposed k-anonymity to protect data privacy in the database. It lets data become anonymous to avoid data privacy leak. But k-anonymity has some problems, it is irreversible, and easier to be attacked by homogeneity attack and background knowledge attack. Later on, scholars have proposed some studies to solve homogeneity attack and background knowledge attack. But their studies still cannot recover back to the original data. In this paper, we propose a data anonymity method. It can be reversible and also prevent those two attacks. Our study is based on the proposed r-transform. It can be used on the numeric type of attributes in the outsource database. In the experiment, we discussed the time required to anonymize and recover data. Furthermore, we investigated the defense against homogeneous attack and background knowledge attack. At the end, we summarized the proposed method and future researches.

     

/

返回文章
返回