Privacy preserving in data-mining: A survey on security of outsourced transaction databases

Authors

  • Parmar J Department of Computer Engineering, Hasmukh Goswami College of Engineering, Vehlal, Gujarat, India
  • Gupta VK Department of Computer Engineering, Hasmukh Goswami College of Engineering, Vehlal, Gujarat, India
  • Rajput I Department of Computer Engineering, Hasmukh Goswami College of Engineering, Vehlal, Gujarat, India

Keywords:

Access Control, Freshness, Integrity, Outsourced Databases, Query Authentication, Security mechanisms

Abstract

Database Outsourcing is a promising data management system in which Data-owner stores the confidential information at the third party service provider‟s site. The service provider manages and administers the database and avails the readymade services to the data owner and their clients to create, update, delete and access the database. Although database security is required because more service providers are not trustworthiness.The major requirements for getting security in outsourced databases are confidentiality, privacy, integrity, freshness in case of dynamic updates, access control in multi-user environment, availability and query authentication and assurance. To achieve these all requirements various security mechanisms like access control based approach, order preserving encryption based approach, hardware based encryption approach, fake tuple based approach, secret sharing approach, authenticated data structure approach, attributes based approach, combined fragmentation and encryption based approach, have been put forth till date. In this paper various security mechanisms analyzed and their significance given in this survey paper.

References

http://www.computerweekly.com/news/2240178104/Badoutsourcingdecisions-cause-63-of-data-breaches.

http://www.networkworld.com/news/2012/020712-data- breach-255782.html

www.oracle.com/technetwork/topics/.../oes-refarch-dbaas508111.pdf

http://dbaas.wordpress.com/2008/05/14/whatexactly-is-database-as-aservice/

https://451research.com/reportshort?entityId=78105&referrer=marketing

Yung-Wang Lin, Li-Cheng Yang, Luon-Chang Lin, and Yeong-ChinChen, Preserving Privacy in Outsourced Database, International Journal of Computer and Communication Engineering, Vol. 3, No. 5, September 2014.

H. Hacigumus, B. Iyer and S. Mehrotra, Providing database as a service, in Proc. of IEEE 18th ICDE, 2002, pp. 29-38.

E. Mykletun, M. Narasimha, and G. Tsudik,Authentication and integrity in outsourced databases, In Proc. of ACM Trans. On Storage, vol. 2, 2006,pp. 107-138.

M. Xie, H. Wang, J. Yin, and X. Meng, Integrity auditing of outsourced data,”VLDB 2007, pp. 782-793.

Zheng-Fei Wang, Ai-Guo Tang,Implementation of Encrypted Data for Outsourced Database, In Proc. of Second International Conference on Computational Intelligence and Natural Computing (CINC), IEEE, 2010, pp. 150-153.

Li Feifei, Marios H, George K, Dynamic Authenticated Index Structures for Outsourced Database, In Proc. of ACM SIGMOD‟06. Chicago, Illinois, 2006, pp. 121-132.

SomchartFugkeaw, Achieving Privacy and Security in Multi- Owner Data Outsourcing, In Proc. of IEEE Transactions 2012, pp.239-244.

Weichao Wang, ZhiweiLi,Rodney Owens, Bharat Bhargava,Secure and Efficient Access to Outsourced Data, CCSW'09, November 13, 2009, Chicago, Illinois, USA ACM 978-1-60558-784-4/09/11.

Shucheng Yu, Cong Wang, KuiRen, and WenjingLou,Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing, IEEE INFOCOM 2010.

M. Xie, H. Wang, J. Yin, and X. Meng, Integrity auditing of outsourced data, VLDB 2007, pp. 782-793.

M. Xie, H. Wang, J. Yin, and Meng, Providing freshness guarantees for outsourced databases, in Proceedings of the 11th international conference on Extending database technology: Advances in database technology, ser. EDBT ‟08. New York, NY, USA: ACM, 2008, pp.323–332.

P. Ghazizadeh, R. Mukkamala S. Olariu, Data Integrity Evaluation in Cloud Database-as-a-Service”, In Proceedings of IEEE Ninth World

Congress on Services, 2013, pp. 280-285.

FoscaGiannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, and Hui (Wendy) Wang, Privacy-Preserving Mining of Association Rules From Outsourced Transaction. Databases, IEEE SYSTEMS JOURNAL, VOL. 7, NO. 3, SEPTEMBER 2012.

AameekSingh,Ling Liu, SHAROES: A Data Sharing Platform for Outsourced Enterprise Storage Environments,Data engineering, IEEE 2008.

Sumeet Bajaj, RaduSion, TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality, In Proc. of IEEE Transactions on Knowledge and Data Engineering, 2013.

HweeHwa Pang Jilian Zhang KyriakosMouratidis,Scalable Verification for Outsourced Dynamic Databases, ACM.VLDB „09, August 2428, 2009, Lyon, France Copyright 2009.

Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao, Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases, HP Laboratories HPL-2009-119, published by Springer Aug-2009.

R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Order pre-serving encryption for numeric data, In Proceedings of the 2004 ACM SIGMOD

international conference on Manage-ment of data,SIGMOD ‟04, pages 563–574, 2004.

Lena Wiese,Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints, Advance in information and computer security, Springer 2010.

Li Xiong, SlawomirGoryczka, VaidySunderam, Adaptive, Secure, and Scalable Distributed Data Outsourcing: A Vision Paper,3DAPAS‟11, June 8, 2011, San Jose, California, USA. Copyright 2011 ACM 978-1-4503-0705-5/11/06.

Downloads

Published

2024-02-26

How to Cite

Parmar, J., Gupta, V., & Rajput, I. (2024). Privacy preserving in data-mining: A survey on security of outsourced transaction databases. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(12), 1377–1385. Retrieved from https://ijact.in/index.php/j/article/view/239

Issue

Section

Review Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.