skip to main content
10.1145/3321707.3321778acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
research-article

A benefit-driven genetic algorithm for balancing privacy and utility in database fragmentation

Authors Info & Claims
Published:13 July 2019Publication History

ABSTRACT

In outsourcing data storage, privacy and utility are significant concerns. Techniques such as data encryption can protect the privacy of sensitive information but affect the efficiency of data usage accordingly. By splitting attributes of sensitive associations, database fragmentation can protect data privacy. In the meantime, data utility can be improved through grouping data of high affinity. In this paper, a benefit-driven genetic algorithm is proposed to achieve a better balance between privacy and utility for database fragmentation. To integrate useful fragmentation information in different solutions, a matching strategy is designed. Two benefit-driven operators for mutation and improvement are proposed to construct valuable fragments and rearrange elements. The experimental results show that the proposed benefit-driven genetic algorithm is competitive when compared with existing approaches in database fragmentation.

References

  1. Piotr Berman and Sofya Raskhodnikova. 2014. Approximation Algorithms for Min-Max Generalization Problems. ACM Transactions on Algorithms 11, 11 (2014), 5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Deyan Chen and Hong Zhao. 2012. Data security and privacy protection issues in cloud computing. In 2012 International Conference on Computer Science and Electronics Engineering, Vol. 1. IEEE, 647--651. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. PC Chu and John E Beasley. 1998. Constraint handling in genetic algorithms: the set partitioning problem. Journal of Heuristics 4, 4 (1998), 323--357. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Valentina Ciriani, Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, and Pierangela Samarati. 2010. Combining fragmentation and encryption to protect privacy in data storage. ACM Transactions on Information and System Security 13, 3 (2010), 22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, and Pierangela Samarati. 2015. Loose associations to increase utility in data publishing. Journal of Computer Security 23, 1 (2015), 59--88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dunwei Gong, Jing Sun, and Zhuang Miao. 2018. A set-based genetic algorithm for interval many-objective optimization problems. IEEE Transactions on Evolutionary Computation 22, 1 (2018), 47--60.Google ScholarGoogle ScholarCross RefCross Ref
  7. Sandhya Harikumar and Raji Ramachandran. 2015. Hybridized fragmentation of very large databases using clustering. In 2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems. 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  8. Jiajia Huang, Min Peng, Hua Wang, Jinli Cao, Wang Gao, and Xiuzhen Zhang. 2017. A probabilistic method for emerging topic tracking in microblog stream. World Wide Web 20, 2 (2017), 325--350. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ravi Jhawar, Vincenzo Piuri, and Pierangela Samarati. 2012. Supporting security requirements for resource management in cloud computing. In 2012 IEEE International Conference on Computational Science and Engineering. IEEE, 170--177. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Alhassan Khedr, Glenn Gulak, and Vinod Vaikuntanathan. 2016. SHIELD: scalable homomorphic implementation of encrypted data-classifiers. IEEE Trans. Comput. 65, 9 (2016), 2848--2858. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Jens Köhler, Konrad Jünemann, and Hannes Hartenstein. 2015. Confidential database-as-a-service approaches: taxonomy and survey. Journal of Cloud Computing 4, 1 (2015), 1.Google ScholarGoogle ScholarCross RefCross Ref
  12. Lichun Li, Rongxing Lu, Kim-Kwang Raymond Choo, Anwitaman Datta, and Jun Shao. 2016. Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Transactions on Information Forensics and Security 11, 8 (2016), 1847--1861.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Meikang Qiu, Zhong Ming, Jiayin Li, Keke Gai, and Ziliang Zong. 2015. Phase-change memory optimization for green cloud with genetic algorithm. IEEE Trans. Comput. 64, 12 (2015), 3528--3540. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Jiangang Shu, Xiaohua Jia, Kan Yang, and Hua Wang. 2018. Privacy-preserving task recommendation services for crowdsourcing. IEEE Transactions on Services Computing (2018).Google ScholarGoogle Scholar
  15. Suk-Kyu Song and Narasimhaiah Gorla. 2000. A genetic algorithm for vertical fragmentation and access path selection. Comput. J. 43, 1 (2000), 81--93.Google ScholarGoogle ScholarCross RefCross Ref
  16. R Srinivas, KA Sireesha, and Shaik Vahida. 2017. Preserving Privacy in Vertically Partitioned Distributed Data Using Hierarchical and Ring Models. In Artificial Intelligence and Evolutionary Computations in Engineering Systems. Springer, 585--596.Google ScholarGoogle Scholar
  17. Xiaoxun Sun, Hua Wang, Jiuyong Li, and Yanchun Zhang. 2012. Satisfying privacy requirements before data anonymization. Comput. J. 55, 4 (2012), 422--437. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Noorul Hussain UbaidurRahman, Chithralekha Balamurugan, and Rajapandian Mariappan. 2015. A novel DNA computing based encryption and decryption algorithm. Procedia Computer Science 46 (2015), 463--475.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Hua Wang, Zonghua Zhang, and Tarek Taleb. 2018. Special issue on security and privacy of IoT. World Wide Web 21, 1 (2018), 1--6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Xiaofeng Xu, Li Xiong, and Jinfei Liu. 2015. Database fragmentation with confidentiality constraints: A graph search approach. In 2015 ACM Conference on Data and Application Security and Privacy. 263--270. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Jiangshan Yu, Guilin Wang, Yi Mu, and Wei Gao. 2014. An efficient generic framework for three-factor authentication with provably secure instantiation. IEEE transactions on information forensics and security 9, 12 (2014), 2302--2313. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, and Geyong Min. 2017. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security 12, 4 (2017), 767--778. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Ji Zhang, Xiaohui Tao, and Hua Wang. 2014. Outlier detection from large distributed databases. World Wide Web 17, 4 (2014), 539--568. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A benefit-driven genetic algorithm for balancing privacy and utility in database fragmentation

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          GECCO '19: Proceedings of the Genetic and Evolutionary Computation Conference
          July 2019
          1545 pages
          ISBN:9781450361118
          DOI:10.1145/3321707

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 13 July 2019

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate1,669of4,410submissions,38%

          Upcoming Conference

          GECCO '24
          Genetic and Evolutionary Computation Conference
          July 14 - 18, 2024
          Melbourne , VIC , Australia

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader