ABSTRACT
In outsourcing data storage, privacy and utility are significant concerns. Techniques such as data encryption can protect the privacy of sensitive information but affect the efficiency of data usage accordingly. By splitting attributes of sensitive associations, database fragmentation can protect data privacy. In the meantime, data utility can be improved through grouping data of high affinity. In this paper, a benefit-driven genetic algorithm is proposed to achieve a better balance between privacy and utility for database fragmentation. To integrate useful fragmentation information in different solutions, a matching strategy is designed. Two benefit-driven operators for mutation and improvement are proposed to construct valuable fragments and rearrange elements. The experimental results show that the proposed benefit-driven genetic algorithm is competitive when compared with existing approaches in database fragmentation.
- Piotr Berman and Sofya Raskhodnikova. 2014. Approximation Algorithms for Min-Max Generalization Problems. ACM Transactions on Algorithms 11, 11 (2014), 5. Google ScholarDigital Library
- Deyan Chen and Hong Zhao. 2012. Data security and privacy protection issues in cloud computing. In 2012 International Conference on Computer Science and Electronics Engineering, Vol. 1. IEEE, 647--651. Google ScholarDigital Library
- PC Chu and John E Beasley. 1998. Constraint handling in genetic algorithms: the set partitioning problem. Journal of Heuristics 4, 4 (1998), 323--357. Google ScholarDigital Library
- Valentina Ciriani, Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, and Pierangela Samarati. 2010. Combining fragmentation and encryption to protect privacy in data storage. ACM Transactions on Information and System Security 13, 3 (2010), 22. Google ScholarDigital Library
- Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, and Pierangela Samarati. 2015. Loose associations to increase utility in data publishing. Journal of Computer Security 23, 1 (2015), 59--88. Google ScholarDigital Library
- Dunwei Gong, Jing Sun, and Zhuang Miao. 2018. A set-based genetic algorithm for interval many-objective optimization problems. IEEE Transactions on Evolutionary Computation 22, 1 (2018), 47--60.Google ScholarCross Ref
- Sandhya Harikumar and Raji Ramachandran. 2015. Hybridized fragmentation of very large databases using clustering. In 2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems. 1--5.Google ScholarCross Ref
- Jiajia Huang, Min Peng, Hua Wang, Jinli Cao, Wang Gao, and Xiuzhen Zhang. 2017. A probabilistic method for emerging topic tracking in microblog stream. World Wide Web 20, 2 (2017), 325--350. Google ScholarDigital Library
- Ravi Jhawar, Vincenzo Piuri, and Pierangela Samarati. 2012. Supporting security requirements for resource management in cloud computing. In 2012 IEEE International Conference on Computational Science and Engineering. IEEE, 170--177. Google ScholarDigital Library
- Alhassan Khedr, Glenn Gulak, and Vinod Vaikuntanathan. 2016. SHIELD: scalable homomorphic implementation of encrypted data-classifiers. IEEE Trans. Comput. 65, 9 (2016), 2848--2858. Google ScholarDigital Library
- Jens Köhler, Konrad Jünemann, and Hannes Hartenstein. 2015. Confidential database-as-a-service approaches: taxonomy and survey. Journal of Cloud Computing 4, 1 (2015), 1.Google ScholarCross Ref
- Lichun Li, Rongxing Lu, Kim-Kwang Raymond Choo, Anwitaman Datta, and Jun Shao. 2016. Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Transactions on Information Forensics and Security 11, 8 (2016), 1847--1861.Google ScholarDigital Library
- Meikang Qiu, Zhong Ming, Jiayin Li, Keke Gai, and Ziliang Zong. 2015. Phase-change memory optimization for green cloud with genetic algorithm. IEEE Trans. Comput. 64, 12 (2015), 3528--3540. Google ScholarDigital Library
- Jiangang Shu, Xiaohua Jia, Kan Yang, and Hua Wang. 2018. Privacy-preserving task recommendation services for crowdsourcing. IEEE Transactions on Services Computing (2018).Google Scholar
- Suk-Kyu Song and Narasimhaiah Gorla. 2000. A genetic algorithm for vertical fragmentation and access path selection. Comput. J. 43, 1 (2000), 81--93.Google ScholarCross Ref
- R Srinivas, KA Sireesha, and Shaik Vahida. 2017. Preserving Privacy in Vertically Partitioned Distributed Data Using Hierarchical and Ring Models. In Artificial Intelligence and Evolutionary Computations in Engineering Systems. Springer, 585--596.Google Scholar
- Xiaoxun Sun, Hua Wang, Jiuyong Li, and Yanchun Zhang. 2012. Satisfying privacy requirements before data anonymization. Comput. J. 55, 4 (2012), 422--437. Google ScholarDigital Library
- Noorul Hussain UbaidurRahman, Chithralekha Balamurugan, and Rajapandian Mariappan. 2015. A novel DNA computing based encryption and decryption algorithm. Procedia Computer Science 46 (2015), 463--475.Google ScholarDigital Library
- Hua Wang, Zonghua Zhang, and Tarek Taleb. 2018. Special issue on security and privacy of IoT. World Wide Web 21, 1 (2018), 1--6. Google ScholarDigital Library
- Xiaofeng Xu, Li Xiong, and Jinfei Liu. 2015. Database fragmentation with confidentiality constraints: A graph search approach. In 2015 ACM Conference on Data and Application Security and Privacy. 263--270. Google ScholarDigital Library
- Jiangshan Yu, Guilin Wang, Yi Mu, and Wei Gao. 2014. An efficient generic framework for three-factor authentication with provably secure instantiation. IEEE transactions on information forensics and security 9, 12 (2014), 2302--2313. Google ScholarDigital Library
- Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, and Geyong Min. 2017. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security 12, 4 (2017), 767--778. Google ScholarDigital Library
- Ji Zhang, Xiaohui Tao, and Hua Wang. 2014. Outlier detection from large distributed databases. World Wide Web 17, 4 (2014), 539--568. Google ScholarDigital Library
Index Terms
- A benefit-driven genetic algorithm for balancing privacy and utility in database fragmentation
Recommendations
MDDE: multitasking distributed differential evolution for privacy-preserving database fragmentation
AbstractDatabase fragmentation has been used as a protection mechanism of database’s privacy by allocating attributes with sensitive associations into separate data fragments. A typical relational database consists of multiple relations. Thus, ...
An Information-Driven Genetic Algorithm for Privacy-Preserving Data Publishing
Web Information Systems Engineering – WISE 2022AbstractDue to the expanding requirements for data publishing and growing concerns regarding data privacy, the privacy-preserving data publishing (PPDP) problem has received considerable attention from research communities, industries, and governments. ...
Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase
DBSec 2013: Proceedings of the 27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy XXVII - Volume 7964Shamir proposed the setbase approach as a means of improving security and privacy of the traditional biometric system. In this paper, we propose privacy-preserving drawer size standards for the biometric setbase. The proposal incorporates database ...
Comments