Privacy preserving SQL queries

Hyun A. Park, Justin Zhan, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

One of the most substantial ways to protect sensitive information is encryption of data. However, the crypto-graphic method brings in some problems such as inefficiency and malfunctioning, especially impossibility of arithmetic. The previous works in this area have been proved insecure or can provide only a few or several SQL queries. Actually, there is no scheme which can support secure all kinds of SQL queries and arithmetic. We propose a novel scheme to solve this problem. We do not encrypt every data itself but permute all the data within each attribute so that we can break the relation of the data and the owner. Accordingly, the proposed scheme guarantees intractability of re-identification for data-owners' privacy and at the same time enables the miner to get the information he wants.

Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
Pages549-554
Number of pages6
DOIs
Publication statusPublished - 2008 Sep 15
Event2nd International Conference on Information Security and Assurance, ISA 2008 - Busan, Korea, Republic of
Duration: 2008 Apr 242008 Apr 26

Other

Other2nd International Conference on Information Security and Assurance, ISA 2008
CountryKorea, Republic of
CityBusan
Period08/4/2408/4/26

Fingerprint

Graphic methods
Data privacy
Miners
Cryptography
privacy
miner
guarantee
Owners
Query
Privacy preserving
Encryption
Guarantee
Inefficiency
Privacy
Impossibility

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems and Management
  • Electrical and Electronic Engineering
  • Communication

Cite this

Park, H. A., Zhan, J., & Lee, D. H. (2008). Privacy preserving SQL queries. In Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008 (pp. 549-554). [4511626] https://doi.org/10.1109/ISA.2008.40

Privacy preserving SQL queries. / Park, Hyun A.; Zhan, Justin; Lee, Dong Hoon.

Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. 2008. p. 549-554 4511626.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Park, HA, Zhan, J & Lee, DH 2008, Privacy preserving SQL queries. in Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008., 4511626, pp. 549-554, 2nd International Conference on Information Security and Assurance, ISA 2008, Busan, Korea, Republic of, 08/4/24. https://doi.org/10.1109/ISA.2008.40
Park HA, Zhan J, Lee DH. Privacy preserving SQL queries. In Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. 2008. p. 549-554. 4511626 https://doi.org/10.1109/ISA.2008.40
Park, Hyun A. ; Zhan, Justin ; Lee, Dong Hoon. / Privacy preserving SQL queries. Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. 2008. pp. 549-554
@inproceedings{beacb6f826c64ce9ae6a58bfec1ad758,
title = "Privacy preserving SQL queries",
abstract = "One of the most substantial ways to protect sensitive information is encryption of data. However, the crypto-graphic method brings in some problems such as inefficiency and malfunctioning, especially impossibility of arithmetic. The previous works in this area have been proved insecure or can provide only a few or several SQL queries. Actually, there is no scheme which can support secure all kinds of SQL queries and arithmetic. We propose a novel scheme to solve this problem. We do not encrypt every data itself but permute all the data within each attribute so that we can break the relation of the data and the owner. Accordingly, the proposed scheme guarantees intractability of re-identification for data-owners' privacy and at the same time enables the miner to get the information he wants.",
author = "Park, {Hyun A.} and Justin Zhan and Lee, {Dong Hoon}",
year = "2008",
month = "9",
day = "15",
doi = "10.1109/ISA.2008.40",
language = "English",
isbn = "9780769531267",
pages = "549--554",
booktitle = "Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008",

}

TY - GEN

T1 - Privacy preserving SQL queries

AU - Park, Hyun A.

AU - Zhan, Justin

AU - Lee, Dong Hoon

PY - 2008/9/15

Y1 - 2008/9/15

N2 - One of the most substantial ways to protect sensitive information is encryption of data. However, the crypto-graphic method brings in some problems such as inefficiency and malfunctioning, especially impossibility of arithmetic. The previous works in this area have been proved insecure or can provide only a few or several SQL queries. Actually, there is no scheme which can support secure all kinds of SQL queries and arithmetic. We propose a novel scheme to solve this problem. We do not encrypt every data itself but permute all the data within each attribute so that we can break the relation of the data and the owner. Accordingly, the proposed scheme guarantees intractability of re-identification for data-owners' privacy and at the same time enables the miner to get the information he wants.

AB - One of the most substantial ways to protect sensitive information is encryption of data. However, the crypto-graphic method brings in some problems such as inefficiency and malfunctioning, especially impossibility of arithmetic. The previous works in this area have been proved insecure or can provide only a few or several SQL queries. Actually, there is no scheme which can support secure all kinds of SQL queries and arithmetic. We propose a novel scheme to solve this problem. We do not encrypt every data itself but permute all the data within each attribute so that we can break the relation of the data and the owner. Accordingly, the proposed scheme guarantees intractability of re-identification for data-owners' privacy and at the same time enables the miner to get the information he wants.

UR - http://www.scopus.com/inward/record.url?scp=51349162111&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=51349162111&partnerID=8YFLogxK

U2 - 10.1109/ISA.2008.40

DO - 10.1109/ISA.2008.40

M3 - Conference contribution

SN - 9780769531267

SP - 549

EP - 554

BT - Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008

ER -