English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21652856      Online Users : 157
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 光電與通訊學系 > 期刊論文 >  Item 310904400/86955


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/86955


    Title: Preserving Privacy in Outsourced Database
    Authors: Yung-Wang Lin;Li-Cheng Yang;Luon-Chang Lin;Yeong-Chin Chen
    Contributors: 光電與通訊學系
    Date: 2014-05
    Issue Date: 2014-11-13 06:52:05 (UTC+0)
    Abstract: —The data rapidly increases with time. To deal
    massive data, or called big data, the idea of database as a service
    has been proposed. Outsourced database provider offers a lot of
    computing power and storage area. For organizations, they do
    not need to build their own infrastructure. It can reduce the cost
    of consumption. However, the data stored in the third-party
    provider side, if the third party can not be trusted, sensitive data
    within organization will have leaked crisis. In order to preserve
    privacy in organization's database, a number of approaches for
    preserving privacy have been proposed. Although the database
    has many security problems should be addressed, such as
    authentication, integrity, access control, and privacy. Also,
    studies on database need to consider performance efficiently
    when data updating. But there are huge problems so that we can
    not address easily. Hence, this paper mainly discusses the
    recently proposed approaches for preserving privacy only. We
    classify and organize approaches, and also discuss these.
    Approaches are divided into two categories, data encryption and
    data fragmentation. We introduce in simple common approach,
    give an illustration, and finally discuss challenges for each
    approach respectively. In the approach of data encryption, we
    introduce k-anonymity which is a mainstream solution. In data
    fragmentation, we introduce clustering which is new idea
    solution. Finally, we summarize these approaches for preserving
    privacy and discuss research future works.
    Relation: International Journal of Computer and Communication Engineering
    Appears in Collections:[光電與通訊學系] 期刊論文

    Files in This Item:

    There are no files associated with this item.



    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback