Anonymity Query Method of Outsourced Database

被引:0
|
作者
Zhang, Yonghua [1 ]
机构
[1] Shijiazhuang Univ Economicsr, Shijiazhuang 311215, Peoples R China
关键词
outsourced database; trusted third party; privacy preservation; anonymous;
D O I
10.4028/www.scientific.net/AMR.798-799.837
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper analyzes the traditional outsourcing model(TOM). Aiming at that TOM has disadvantages such as low security on User Privacy, this paper proposes a new access model in outsourced database. Using the trusted third party(TTP) makes all operations in the database become anonymous in order to achieve the purpose of user privacy protection.
引用
收藏
页码:837 / 841
页数:5
相关论文
共 50 条
  • [31] Improved algorithm for management of outsourced database
    Zhen Guo
    Jun Ye
    [J]. Neural Computing and Applications, 2021, 33 : 647 - 653
  • [32] Integrity Assurance of Outsourced Spatial Database
    Hong, Jun
    Wen, Tao
    Ye, Zheng-Wang
    Kang, Jun
    [J]. Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (03): : 327 - 333
  • [33] Improved algorithm for management of outsourced database
    Guo, Zhen
    Ye, Jun
    [J]. NEURAL COMPUTING & APPLICATIONS, 2021, 33 (02): : 647 - 653
  • [34] A novel attributes anonymity scheme in continuous query
    Zhang, Lei
    Li, Jing
    Yang, Songtao
    Wang, Bin
    Bian, Xingchao
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 101 (02) : 943 - 961
  • [35] Ontology pattern of trajectory anonymity for query events
    Zhu, Lin
    [J]. 2018 INTERNATIONAL CONFERENCE ON SENSOR NETWORKS AND SIGNAL PROCESSING (SNSP 2018), 2018, : 457 - 461
  • [36] Authentication of outsourced linear function query with efficient updates
    Gang Sheng
    Chunming Tang
    Hongyan Han
    Wei Gao
    Xing Hu
    [J]. Cluster Computing, 2019, 22 : 10031 - 10039
  • [37] Verifiable algorithm for outsourced database with updating
    Zhen Guo
    Hui Li
    Chunjie Cao
    Zhengxi Wei
    [J]. Cluster Computing, 2019, 22 : 5185 - 5193
  • [38] A novel attributes anonymity scheme in continuous query
    Lei Zhang
    Jing Li
    Songtao Yang
    Bin Wang
    Xingchao Bian
    [J]. Wireless Personal Communications, 2018, 101 : 943 - 961
  • [39] Authentication of outsourced linear function query with efficient updates
    Sheng, Gang
    Tang, Chunming
    Han, Hongyan
    Gao, Wei
    Hu, Xing
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S10031 - S10039
  • [40] Secure Similar Sequence Query on Outsourced Genomic Data
    Cheng, Ke
    Hou, Yantian
    Wang, Liangmin
    [J]. PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 237 - 251