Mostra el registre d'ítem simple
Secure and efficient anonymization of distributed confidential databases
dc.contributor.author | Herranz Sotoca, Javier |
dc.contributor.author | Nin Guerrero, Jordi |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament de Matemàtica Aplicada IV |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors |
dc.date.accessioned | 2015-09-02T08:12:33Z |
dc.date.created | 2014 |
dc.date.issued | 2014 |
dc.identifier.citation | Herranz, J., Nin, J. Secure and efficient anonymization of distributed confidential databases. "International journal of information security", 2014, núm. 6, p. 497-512. |
dc.identifier.issn | 1615-5262 |
dc.identifier.uri | http://hdl.handle.net/2117/76549 |
dc.description.abstract | Let us consider the following situation: t entities (e.g., hospitals) hold different databases containing different records for the same type of confidential (e.g., medical) data. They want to deliver a protected version of this data to third parties (e.g., pharmaceutical researchers), preserving in some way both the utility and the privacy of the original data. This can be done by applying a statistical disclosure control (SDC) method. One possibility is that each entity protects its own database individually, but this strategy provides less utility and privacy than a collective strategy where the entities cooperate, by means of a distributed protocol, to produce a global protected dataset. In this paper, we investigate the problem of distributed protocols for SDC protection methods. We propose a simple, efficient and secure distributed protocol for the specific SDC method of rank shuffling. We run some experiments to evaluate the quality of this protocol and to compare the individual and collective strategies for solving the problem of protecting a distributed database. With respect to other distributed versions of SDC methods, the new protocol provides either more security or more efficiency, as we discuss through the paper. |
dc.format.extent | 16 p. |
dc.language.iso | eng |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica |
dc.subject.other | Statistical disclosure control |
dc.subject.other | Distributed computation |
dc.subject.other | Database security |
dc.subject.other | ElGamal cryptosystem |
dc.title | Secure and efficient anonymization of distributed confidential databases |
dc.type | Article |
dc.contributor.group | Universitat Politècnica de Catalunya. MAK - Matemàtica Aplicada a la Criptografia |
dc.contributor.group | Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions |
dc.identifier.doi | 10.1007/s10207-014-0237-x |
dc.description.peerreviewed | Peer Reviewed |
dc.subject.inspec | Classificació INSPEC::Automation::Office automation |
dc.relation.publisherversion | http://link.springer.com/article/10.1007/s10207-014-0237-x |
dc.rights.access | Restricted access - publisher's policy |
local.identifier.drac | 15289691 |
dc.description.version | Postprint (published version) |
dc.date.lift | 10000-01-01 |
local.citation.author | Herranz, J.; Nin, J. |
local.citation.publicationName | International journal of information security |
local.citation.volume | 13 |
local.citation.number | 6 |
local.citation.startingPage | 497 |
local.citation.endingPage | 512 |
Fitxers d'aquest items
Aquest ítem apareix a les col·leccions següents
-
Articles de revista [1.049]
-
Articles de revista [48]
-
Articles de revista [3.267]
-
Articles de revista [382]