CFP last date
20 May 2024
Reseach Article

Dual Layer Privacy Model for Hidden Databases

by Richa Jindal, Chander Kiran
journal cover thumbnail
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 13
Year of Publication: 2010
Authors: Richa Jindal, Chander Kiran
10.5120/287-449

Richa Jindal, Chander Kiran . Dual Layer Privacy Model for Hidden Databases. International Journal of Computer Applications. 1, 13 ( February 2010), 22-25. DOI=10.5120/287-449

@article{ 10.5120/287-449,
author = { Richa Jindal, Chander Kiran },
title = { Dual Layer Privacy Model for Hidden Databases },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 13 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 22-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number13/287-449/ },
doi = { 10.5120/287-449 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:46:25.370615+05:30
%A Richa Jindal
%A Chander Kiran
%T Dual Layer Privacy Model for Hidden Databases
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 13
%P 22-25
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Most of the data available on internet through internet, comes from the databases, known as hidden databases, are now open to various kind of privacy threats. Security issues specific to such hidden databases, however, have been largely overlooked by the research community, possibly due to the false sense of security provided by the restrictive access to such databases. Two of such threats, individual tuple privacy and aggregate information privacy, are being highlighted in this paper, and one of the possible solutions for them is being proposed here. We propose a model, which is divided into two layers to provide security against two described attacks to hidden databases. Our hope is that this paper sheds lights on a fruitful direction of future research in security issues related to hidden web databases.

References
  1. Agrawal, R. and Srikant, R., Privacy-Preserving Data Mining, SIGMOD 2000.
  2. Agrawal, R., Srikant, R., and Thomas, D., Privacy Preserving OLAP, SIGMOD 2005.
  3. Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X., Zhu, M., Tools for Privacy Preserving Distributed Data Mining, ACM SIGKDD Explorations, 4(28): 2003.
  4. Dasgupta, A., Zhang, N., Das, G., Chaudhuri, S., Privacy Preservation of Aggregates in Hidden Databases: Why and How?
  5. Dasgupta, A., Das, G., Mannila, H., A random walk approach to sampling hidden databases.SIGMOD 2007.
  6. Das, G., Zhang, N., Privacy Risks in Health Databases From Aggregate Disclosure.
  7. Bergman, M. K., The Deep Web: Surfacing Hidden Value, White Paper, BrightPlanet, 2001.
  8. Maiti, A., Dasgupta, A., Zhang, N., Das, G., HDSampler: Revealing Data Behind Web Form Interfaces
  9. Poorvi L. Vora, Member, and IEEE An Information-Theoretic Approach to Inference Attacks on Random Data Perturbation and a Related Privacy Measure
Index Terms

Computer Science
Information Sciences

Keywords

Hidden databases Privacy preservation Aggregate information Tuple privacy