Privacy Preservation and Protection by Extending Generalized Partial Indices

  • Guoqiang Zhan
  • Zude Li
  • Xiaojun Ye
  • Jianmin Wang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4042)


Privacy violation has attracted more and more attention from the public, and privacy preservation has become a hot topic in academic communities, industries and societies. Recent research has been focused on purpose-based techniques and models with little consideration on balancing privacy enhancement and performance. We propose an efficient Privacy Aware Partial Index (PAPI) mechanism based on both the concept of purposes and the theory of partial indices. In the PAPI mechanism, all purposes are independent from each other and organized in a flatten purpose tree(\(\mathcal{FPT}\)). Thus, security administrators can update the flatten purpose tree by adding or deleting purposes. Intended purposes are maintained in PAPI directly. Furthermore, based on the PAPI mechanism, we extend the existing query optimizer and executor to enforce the privacy policies. Finally, the experimental results demonstrate the feasibility and efficiency of the PAPI mechanism.


Access Control Privacy Policy Intended Purpose Privacy Preservation Purpose Tree 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Agrawal, R., Keirnan, J., Srikant, R., Xu, Y.: Hippocratic database. In: Proceedings of the 28th VLDB Conference (2002)Google Scholar
  2. 2.
    Byun, J.-W., Berino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: Proceedings of the tenth ACM symposium on Access control models and technologies (SACMAT 2005), pp. 102–110 (2005)Google Scholar
  3. 3.
    Byun, J.-W., Bertino, E.: Vision paper: Micro-views, or on how to protect privacy while enhancing data usability. In: SIGMOD Record (2005) (to be published)Google Scholar
  4. 4.
    Byun, J.-W., Bertino, E., Li, N.: Purpose based access control for privacy protection in relational dtabase systems. Technical Report 2004-52, Purdue Univ. (2004)Google Scholar
  5. 5.
    W. W. W. Consortium (W3C). A p3p preference exchange language 1.0 (appel 1.0), Available at:
  6. 6.
    Bitton, D., DeWitt, D.J., Turbyfill, C.: Benchmarking database: system a systematic approach. In: Ninth International Conference on Very Large Data Bases, pp. 8–19 (October 1983)Google Scholar
  7. 7.
    Bitton, D., DeWitt, D.J., Turbyfill, C.: Benchmarking database system a systematic approach. In: Proceeding of CCS 2004, pp. 25–29 (October 2004)Google Scholar
  8. 8.
    Gasarch, W.: A survey on private information retrieval. The Bulletin of the EATCS 82, 72–107 (2004)MATHMathSciNetGoogle Scholar
  9. 9.
    Graef, G.: Query evaluation techniques for large databases. ACM Computing Surveys 25(2), 73–169 (1993)CrossRefGoogle Scholar
  10. 10.
    IBM. The enterprise privacy authorization language (epal), Available at:
  11. 11.
    LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan, R., Xu, Y., DeWitt, D.: Limiting disclosure in hippocratic database. In: The 30th International Conference on Very Large Databases (August 2004)Google Scholar
  12. 12.
    T. C. C. P. S. Organisations. Common criteria for information technology security evaluation, part 2, draft version 3 and version 2.1-2.3 (August 2005)Google Scholar
  13. 13.
    Ashley, P., Powers, C.S., Schunter, M.: Privacy, access control, and privacy management. In: Third International Symposium on Electronic Commerce (2002)Google Scholar
  14. 14.
    Sandhu, R., Chen, F.: The multilevel relational (mlr) data model. ACM Transactions on Information and System Security 1(1), 93–132 (1998)CrossRefGoogle Scholar
  15. 15.
    Selinger, P.G., Astrahan, M.M., Chamberlin, D.d., Lorie, R.A., Price, T.G.: Access path selection in a relational dababase management system. In: Proceedings of the 1979 ACM SIGMOD Conference on the Management of Data (May-June 1979)Google Scholar
  16. 16.
    Seshadri, P., Swami, A.: Generalized partial indexes. In: Proceedings of the Eleventh International Conference on Data Engineering (ICDE), pp. 420–427 (1995)Google Scholar
  17. 17.
    Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)MATHCrossRefMathSciNetGoogle Scholar
  18. 18.
    W. W. W. C. (W3C). Platform for privacy preferences (p3p), Available at:

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Guoqiang Zhan
    • 1
  • Zude Li
    • 1
  • Xiaojun Ye
    • 1
  • Jianmin Wang
    • 1
  1. 1.School of SoftwareTsinghua UniversityBeijingChina

Personalised recommendations