Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients

@inproceedings{Ciriani2009EnforcingCC,
  title={Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients},
  author={Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati},
  booktitle={DBSec},
  year={2009}
}
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but-curious" servers are typically based on an overlying layer of encryption that is applied on the whole information, or use a combination of fragmentation and encryption. The computational load imposed by encryption makes such approaches not suitable for scenarios with lightweight clients. In this paper, we address this issue and propose a novel model for enforcing privacy requirements on the… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 18 CITATIONS

Data Outsourcing in Cloud Environments: A Privacy Preserving Approach

  • 2012 Ninth International Conference on Information Technology - New Generations
  • 2012
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Selective data outsourcing for enforcing privacy

  • Journal of Computer Security
  • 2011
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND

Checking inference-proofness of attribute-disjoint and duplicate-preserving fragmentations

  • Annals of Mathematics and Artificial Intelligence
  • 2019
VIEW 1 EXCERPT
CITES METHODS

Inference-Proof Materialized Views

VIEW 2 EXCERPTS
CITES BACKGROUND

Data Combination Privacy Preservation Adjusting Mechanism for Software as a Service

  • 2013 IEEE International Conference on Systems, Man, and Cybernetics
  • 2013
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 18 REFERENCES

Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases

  • 2009 29th IEEE International Conference on Distributed Computing Systems
  • 2009
VIEW 3 EXCERPTS

Providing database as a service

  • Proceedings 18th International Conference on Data Engineering
  • 2002
VIEW 1 EXCERPT