Download presentation
Presentation is loading. Please wait.
Published byScot McDowell Modified over 9 years ago
1
CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation
2
Combining Fragmentation and Encryption for outsourcing Breaking sensitive associations between attributes
3
Confidentiality Constraints Example: constraint {DoB, Zip, Illness} – Okay to release {DoB, Zip}, {Zip}, …
4
Constraint Example
5
Basic ideas Singleton constraints – encryption Association constraints – encryption of any one attribute – Fragmentation of the attributes
6
Example
9
Fragmentation Classical distributed database design problem (vertical fragmentation) Total number of possible fragmentations given N attributes? What would be an optimal fragmentation?
10
Optimal fragmentation Correctly enforce constraints Maximal visibility Minimal fragmentation – Maximal attribute affinity Problem is NP hard
11
Algorithm without confidentiality constraints Without confidentiality constraints - Hierarchical clustering With confidentiality constraints? – {s}, {n,d}, {n,z}, {n, i}, {n, p}, {d, z, i}, {d, z, p}
12
References Combining fragmentation and encryption to protect privacy in data storage, TISSEC, 2010 Fragmentation design for efficient query execution over sensitive distributed databases, ICDCS, 2009
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.