Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

IFIP Annual Conference on Data and Applications Security and Privacy

DBSec 2007: Data and Applications Security XXI pp 93–94Cite as

  1. Home
  2. Data and Applications Security XXI
  3. Conference paper
Privacy-Preserving Schema Matching Using Mutual Information

Privacy-Preserving Schema Matching Using Mutual Information

  • Isabel F. Cruz1,
  • Roberto Tamassia2 &
  • Danfeng Yao2 
  • Conference paper
  • 1168 Accesses

  • 13 Citations

Part of the Lecture Notes in Computer Science book series (LNISA,volume 4602)

Abstract

The problem of schema or ontology matching is to define mappings among schema or ontology elements. Such mappings are typically defined between two schemas or two ontologies at a time. Ideally, using the defined mappings, one would be able to issue a single query that will be rewritten automatically to all the databases, instead of manually writing a query to each database. In a centrally mediated architecture a query is written in terms of a global schema or ontology that integrates all the database schemas or ontologies, while in a peer-to-peer architecture a query is written in terms of the schema or of the ontology of any of the peer databases.

Keywords

  • Mutual Information
  • Global Schema
  • Schema Match
  • Database Schema
  • Semantic Interoperation

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This work was supported in part by the National Science Foundation under ITR awards IIS–0326284, IIS–0324846, and IIS–0513553.

Chapter PDF

Download to read the full chapter text

References

  1. Agrawal, R., Evfimievski, A.V., Srikant, R.: Information sharing across private databases. In: Proc. ACM SIGMOD, pp. 86–97. ACM Press, New York (2003)

    Google Scholar 

  2. Candan, K.S., Jajodia, S., Subrahmanian, V.S.: Secure mediated databases. In: Proc. IEEE Int. Conf. on Data Engineering, pp. 28–37. IEEE Computer Society Press, Los Alamitos (1996)

    Google Scholar 

  3. Clifton, C., Kantarcioglu, M., Doan, A., Schadow, G., Vaidya, J., Elmagarmid, A.K., Suciu, D.: Privacy-preserving data integration and sharing. In: Proc. ACM Workshop on Research Issues in Data Mining and Knowledge Discovery, pp. 19–26. ACM Press, New York (2004)

    CrossRef  Google Scholar 

  4. Dawson, S., Qian, S., Samarati, P.: Providing security and interoperation of heterogeneous systems. Journal of Distributed and Parallel Databases 8(1), 119–145 (2000)

    CrossRef  Google Scholar 

  5. Freedman, M., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  6. Kang, J., Naughton, J.F.: On schema matching with opaque column names and data values. In: Proc. ACM SIGMOD, pp. 205–216. ACM Press, New York (2003)

    Google Scholar 

  7. Mitra, P., Liu, P., Pan, C.-C.: Privacy-preserving ontology mapping. In: Proc. Int. Workshop on Contexts and Ontologies: Theory, Practice and Applications (2005)

    Google Scholar 

  8. Mitra, P., Pan, C.-C., Liu, P., Atluri, V.: Privacy-preserving semantic interoperation and access control of heterogeneous databases. In: Proc. ACM Conf. on Computer and Communications Security, pp. 66–77. ACM Press, New York (2006)

    Google Scholar 

  9. Rahm, E., Bernstein, P.A.: A survey of approaches to automatic schema matching. VLDB Journal 10(4), 334–350 (2001)

    CrossRef  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Computer Science, University of Illinois at Chicago, USA

    Isabel F. Cruz

  2. Department of Computer Science, Brown University, USA

    Roberto Tamassia & Danfeng Yao

Authors
  1. Isabel F. Cruz
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Roberto Tamassia
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Danfeng Yao
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Steve Barker Gail-Joon Ahn

Rights and permissions

Reprints and Permissions

Copyright information

© 2007 IFIP International Federation for Information Processing

About this paper

Cite this paper

Cruz, I.F., Tamassia, R., Yao, D. (2007). Privacy-Preserving Schema Matching Using Mutual Information. In: Barker, S., Ahn, GJ. (eds) Data and Applications Security XXI. DBSec 2007. Lecture Notes in Computer Science, vol 4602. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73538-0_7

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-540-73538-0_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73533-5

  • Online ISBN: 978-3-540-73538-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature