Skip to main content

Improvising Technique of Privacy Preserving in Outsourced Transaction Database

  • Conference paper
  • First Online:
Emerging Research in Computing, Information, Communication and Applications
  • 727 Accesses

Abstract

Database outsourcing is a favorable data storage and management system where the data owner keeps confidential information at a third-party service provider’s site. The service provider collects, manages, and controls the database and gives readymade services to the data owner and users to generate, modify, delete, and access the database. Some service providers are not trustworthy, so security is required here. In this paper we have proposed a novel approach of preserving privacy for outsourcing a transaction database based on adding fake transactions in the original database using different cryptographic techniques. Additionally we have proposed an RSA algorithm at the server side that provides encryption of data and protects against forging the contents of the communication between the data owner and the server. Our structure ensures that it enhances or increases security services such as privacy and integrity and increases complexity in the structure of the original TDB to confuse an attacker. This algorithm enhances “corporate privacy”.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. http://en.m.wikipedia.org/wiki/Data_mining

  2. Agrawal, R., Srikant, R.: Privacy preserving data mining. In: Proceedings of the ACM SIGMOD Conference of Management of Data, pp. 439–450 (2000)

    Google Scholar 

  3. Giannotti, F., Lakshmanan, L.V., Monreale, A., Pedreschi, D., Wang, H.: Privacy-preserving outsourcing of association rule mining, ISTI-CNR, Pisa, Italy, Technical Report 2009-TR-013 (2009)

    Google Scholar 

  4. Giannotti, F.F., Lakshmanan, L.V.S., Monreale, A., Pedreschi, D., Wang, H. (Wendy): Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst. J. 7(3), (2012)

    Google Scholar 

  5. Wang, W., Li, Z., Owens, R., Bhargava, B., Secure and Efficient Access to Outsourced Data, CCSW’09, 13 Nov 2009, Chicago, Illinois, USA, ACM 978-1-60558-784-4/09/11

    Google Scholar 

  6. Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing, IEEE INFOCOM (2010)

    Google Scholar 

  7. Hacigumus, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proceedings of the IEEE 18th ICDE, pp. 29–38 (2002)

    Google Scholar 

  8. Singh, A., Liu, L.: SHAROES: A Data Sharing Platform for Outsourced Enterprise Storage Environments, Data Engineering, IEEE (2008)

    Google Scholar 

  9. Bajaj, S., Sion, R.: TrustedDB: A trusted hardware based database with privacy and data confidentiality. In: Proceedings of the IEEE Transactions on Knowledge and Data Engineering (2013)

    Google Scholar 

  10. Pang, H.H., Zhang, J., Mouratidis, K.: Scalable Verification for Outsourced Dynamic Databases, ACM. VLDB 09, 24–28 Aug 2009, Lyon, France Copyright 2009

    Google Scholar 

  11. Thompson, B., Haber, S., Horne, W.G., Sander, T., Yao, D.: Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases, HP Laboratories HPL-2009-119, Published by Springer Aug 2009

    Google Scholar 

  12. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order pre-serving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, SIGMOD 04, pp. 563–574 (20040

    Google Scholar 

  13. Wiese, L.: Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints, Advance in Information and Computer Security. Springer (2010)

    Google Scholar 

  14. Xiong, L., Goryczka, S., Sunderam, V.: Adaptive, Secure, and Scalable Distributed Data Outsourcing: A Vision Paper, 3DAPAS‟11, 8 June 2011, San Jose, California, USA. Copyright 2011 ACM 978-1-4503-0705-5/11/06

    Google Scholar 

  15. Xie, M., Wang, H., Yin, J., Meng, X.: Integrity Auditing of Outsourced Data, VLDB, pp. 782–793 (2007)

    Google Scholar 

  16. Xie, M., Wang, H., Yin, J., Meng, X.: Providing freshness guarantees for outsourced databases. In: Proceedings of the 11th International Conference on Extending Database Technology: Advances in Database Technology, ser. EDBT ‟08. New York, NY, USA: ACM, pp. 323–332 (2008)

    Google Scholar 

  17. Ghazizadeh, P., Mukkamala, R., Olariu, S.: Data integrity evaluation in cloud database-as-a-service. In: Proceedings of IEEE Ninth World Congress on Services, pp. 280–285 (2013)

    Google Scholar 

  18. Wong, W.K., Cheung, D.W., Hung, E., Kao, B., Mamoulis, N.: Security in outsourcing of association rule mining. In: Proceedings of the International Conference Very Large Data Bases, pp. 111–122 (2007)

    Google Scholar 

  19. Tai, C., Yu, P.S., Chen, M.: K-support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining. In: Proceedings of the International Knowledge Discovery Data Mining, pp. 473–482 (2010)

    Google Scholar 

  20. Rizvi, S.J., Haritsa, J.R., Maintaining data privacy in association rule mining. In: Proceedings of the International Conference Very Large Data Bases, pp. 682–693 (2002)

    Google Scholar 

  21. http://fimi.ua.ac.be/data/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jinal Parmar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Jinal Parmar, Vinit Gupta (2016). Improvising Technique of Privacy Preserving in Outsourced Transaction Database. In: Shetty, N., Prasad, N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications . Springer, Singapore. https://doi.org/10.1007/978-981-10-0287-8_62

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0287-8_62

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0286-1

  • Online ISBN: 978-981-10-0287-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics