Abstract
Database outsourcing is a favorable data storage and management system where the data owner keeps confidential information at a third-party service provider’s site. The service provider collects, manages, and controls the database and gives readymade services to the data owner and users to generate, modify, delete, and access the database. Some service providers are not trustworthy, so security is required here. In this paper we have proposed a novel approach of preserving privacy for outsourcing a transaction database based on adding fake transactions in the original database using different cryptographic techniques. Additionally we have proposed an RSA algorithm at the server side that provides encryption of data and protects against forging the contents of the communication between the data owner and the server. Our structure ensures that it enhances or increases security services such as privacy and integrity and increases complexity in the structure of the original TDB to confuse an attacker. This algorithm enhances “corporate privacy”.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Agrawal, R., Srikant, R.: Privacy preserving data mining. In: Proceedings of the ACM SIGMOD Conference of Management of Data, pp. 439–450 (2000)
Giannotti, F., Lakshmanan, L.V., Monreale, A., Pedreschi, D., Wang, H.: Privacy-preserving outsourcing of association rule mining, ISTI-CNR, Pisa, Italy, Technical Report 2009-TR-013 (2009)
Giannotti, F.F., Lakshmanan, L.V.S., Monreale, A., Pedreschi, D., Wang, H. (Wendy): Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst. J. 7(3), (2012)
Wang, W., Li, Z., Owens, R., Bhargava, B., Secure and Efficient Access to Outsourced Data, CCSW’09, 13 Nov 2009, Chicago, Illinois, USA, ACM 978-1-60558-784-4/09/11
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing, IEEE INFOCOM (2010)
Hacigumus, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proceedings of the IEEE 18th ICDE, pp. 29–38 (2002)
Singh, A., Liu, L.: SHAROES: A Data Sharing Platform for Outsourced Enterprise Storage Environments, Data Engineering, IEEE (2008)
Bajaj, S., Sion, R.: TrustedDB: A trusted hardware based database with privacy and data confidentiality. In: Proceedings of the IEEE Transactions on Knowledge and Data Engineering (2013)
Pang, H.H., Zhang, J., Mouratidis, K.: Scalable Verification for Outsourced Dynamic Databases, ACM. VLDB 09, 24–28 Aug 2009, Lyon, France Copyright 2009
Thompson, B., Haber, S., Horne, W.G., Sander, T., Yao, D.: Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases, HP Laboratories HPL-2009-119, Published by Springer Aug 2009
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order pre-serving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, SIGMOD 04, pp. 563–574 (20040
Wiese, L.: Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints, Advance in Information and Computer Security. Springer (2010)
Xiong, L., Goryczka, S., Sunderam, V.: Adaptive, Secure, and Scalable Distributed Data Outsourcing: A Vision Paper, 3DAPAS‟11, 8 June 2011, San Jose, California, USA. Copyright 2011 ACM 978-1-4503-0705-5/11/06
Xie, M., Wang, H., Yin, J., Meng, X.: Integrity Auditing of Outsourced Data, VLDB, pp. 782–793 (2007)
Xie, M., Wang, H., Yin, J., Meng, X.: Providing freshness guarantees for outsourced databases. In: Proceedings of the 11th International Conference on Extending Database Technology: Advances in Database Technology, ser. EDBT ‟08. New York, NY, USA: ACM, pp. 323–332 (2008)
Ghazizadeh, P., Mukkamala, R., Olariu, S.: Data integrity evaluation in cloud database-as-a-service. In: Proceedings of IEEE Ninth World Congress on Services, pp. 280–285 (2013)
Wong, W.K., Cheung, D.W., Hung, E., Kao, B., Mamoulis, N.: Security in outsourcing of association rule mining. In: Proceedings of the International Conference Very Large Data Bases, pp. 111–122 (2007)
Tai, C., Yu, P.S., Chen, M.: K-support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining. In: Proceedings of the International Knowledge Discovery Data Mining, pp. 473–482 (2010)
Rizvi, S.J., Haritsa, J.R., Maintaining data privacy in association rule mining. In: Proceedings of the International Conference Very Large Data Bases, pp. 682–693 (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Jinal Parmar, Vinit Gupta (2016). Improvising Technique of Privacy Preserving in Outsourced Transaction Database. In: Shetty, N., Prasad, N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications . Springer, Singapore. https://doi.org/10.1007/978-981-10-0287-8_62
Download citation
DOI: https://doi.org/10.1007/978-981-10-0287-8_62
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0286-1
Online ISBN: 978-981-10-0287-8
eBook Packages: EngineeringEngineering (R0)