Privacy-Preserving Schema Reuse

被引:0
|
作者
Nguyen Quoc Viet Hung [1 ]
Do Son Thanh [1 ]
Nguyen Thanh Tam [1 ]
Aberer, Karl [1 ]
机构
[1] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the number of schema repositories grows rapidly and several web-based platforms exist to support publishing schemas, schema reuse becomes a new trend. Schema reuse is a methodology that allows users to create new schemas by copying and adapting existing ones. This methodology supports to reduce not only the effort of designing new schemas but also the heterogeneity between them. One of the biggest barriers of schema reuse is about privacy concerns that discourage schema owners from contributing their schemas. Addressing this problem, we develop a framework that enables privacy-preserving schema reuse. Our framework supports the contributors to define their own protection policies in the form of privacy constraints. Instead of showing original schemas, the framework returns an anonymized schema with maximal utility while satisfying these privacy constraints. To validate our approach, we empirically show the efficiency of different heuristics, the correctness of the proposed utility function, the computation time, as well as the trade-off between utility and privacy.
引用
收藏
页码:234 / 250
页数:17
相关论文
共 50 条
  • [1] Privacy-preserving schema matching using mutual information
    Cruz, Isabel F.
    Tamassia, Roberto
    Yao, Danfeng
    [J]. DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 93 - +
  • [2] Privacy-Preserving Information Sharing and Management Schema for Collaborative Social Networks
    Cheng Man Ma
    Yan Zhuang
    [J]. TENCON 2015 - 2015 IEEE REGION 10 CONFERENCE, 2015,
  • [3] Privacy-preserving boosting
    Sébastien Gambs
    Balázs Kégl
    Esma Aïmeur
    [J]. Data Mining and Knowledge Discovery, 2007, 14 : 131 - 170
  • [4] Privacy-preserving boosting
    Gambs, Sebastien
    Kegl, Balazs
    Aimeur, Esma
    [J]. DATA MINING AND KNOWLEDGE DISCOVERY, 2007, 14 (01) : 131 - 170
  • [5] Privacy-Preserving Polling
    Shasha, Dennis
    [J]. COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 108 - +
  • [6] Privacy-Preserving WSDM
    Korolova, Aleksandra
    [J]. PROCEEDINGS OF THE TWELFTH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING (WSDM'19), 2019, : 4 - 4
  • [7] Privacy-Preserving Statistics
    Vaidya, Jaideep
    [J]. COMPUTER, 2018, 51 (09) : 8 - 9
  • [8] Privacy-preserving SVANETs Privacy-preserving Simple Vehicular Ad-hoc Networks
    Hajny, Jan
    Malina, Lukas
    Martinasek, Zdenek
    Zeman, Vaclav
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 267 - 274
  • [9] Privacy-Preserving and Fair Crowdsourcing Framework With Fine-Grained Reuse Based on Blockchain
    Jiang, Shunrong
    Zhang, Xiao
    Chen, Jingwei
    Li, Jinpeng
    Wu, Haiqin
    Liu, Yiliang
    Zhou, Yong
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (04): : 4061 - 4075
  • [10] On Privacy-preserving Cloud Auction
    Chen, Zhili
    Chen, Lin
    Huang, Liusheng
    Zhong, Hong
    [J]. PROCEEDINGS OF 2016 IEEE 35TH SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2016, : 279 - 288