ASIA unversity:Item 310904400/86955
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 94286/110023 (86%)
造访人次 : 21691791      在线人数 : 595
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    ASIA unversity > 資訊學院 > 光電與通訊學系 > 期刊論文 >  Item 310904400/86955


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: http://asiair.asia.edu.tw/ir/handle/310904400/86955


    题名: Preserving Privacy in Outsourced Database
    作者: Yung-Wang Lin;Li-Cheng Yang;Luon-Chang Lin;Yeong-Chin Chen
    贡献者: 光電與通訊學系
    日期: 2014-05
    上传时间: 2014-11-13 06:52:05 (UTC+0)
    摘要: —The data rapidly increases with time. To deal
    massive data, or called big data, the idea of database as a service
    has been proposed. Outsourced database provider offers a lot of
    computing power and storage area. For organizations, they do
    not need to build their own infrastructure. It can reduce the cost
    of consumption. However, the data stored in the third-party
    provider side, if the third party can not be trusted, sensitive data
    within organization will have leaked crisis. In order to preserve
    privacy in organization's database, a number of approaches for
    preserving privacy have been proposed. Although the database
    has many security problems should be addressed, such as
    authentication, integrity, access control, and privacy. Also,
    studies on database need to consider performance efficiently
    when data updating. But there are huge problems so that we can
    not address easily. Hence, this paper mainly discusses the
    recently proposed approaches for preserving privacy only. We
    classify and organize approaches, and also discuss these.
    Approaches are divided into two categories, data encryption and
    data fragmentation. We introduce in simple common approach,
    give an illustration, and finally discuss challenges for each
    approach respectively. In the approach of data encryption, we
    introduce k-anonymity which is a mainstream solution. In data
    fragmentation, we introduce clustering which is new idea
    solution. Finally, we summarize these approaches for preserving
    privacy and discuss research future works.
    關聯: International Journal of Computer and Communication Engineering
    显示于类别:[光電與通訊學系] 期刊論文

    文件中的档案:

    没有与此文件相关的档案.



    在ASIAIR中所有的数据项都受到原著作权保护.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈