Challenges of Privacy-Preserving OLAP Techniques

被引:0
|
作者
Gorlatykh, Andrey V. [1 ]
Zapechnikov, Sergey V. [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Moscow Engn Phys Inst, Dept Cryptol & Cybersecur, Moscow, Russia
来源
PROCEEDINGS OF THE 2017 IEEE RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (2017 ELCONRUS) | 2017年
关键词
On-line Analytical Processing (OLAP); information security; privacy; partly homomorphic encryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Over the last five years, on-line analytical processing (OLAP) became one of the essential information processing technologies. OLAP technology has been successfully used in different areas: retail, financial services, telecommunication, health care etc. Because of this security of data stored in Data Warehouses became one of the most important aspect of this technology, especially when we speaking about data privacy. We review existing privacy-preserving OLAP techniques and identify new challenges of this technology. In particular, OLAP databases are placed often in the untrusted clouds, so it is crucial to create techniques for evaluating widely used statistical functions (mean value, standard deviation, minimum, maximum, and so on) over the encrypted data. For this purpose, we review and compare encryption schemes with special features (partly homomorphic, order-preserving, deterministic etc.) and suggest architecture of application for private OLAP over the encrypted database.
引用
收藏
页码:404 / 408
页数:5
相关论文
共 50 条
  • [21] Privacy-Preserving Remote Diagnostics
    Brickell, Justin
    Porter, Donald E.
    Shmatikov, Vitaly
    Witchel, Emmett
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 498 - 507
  • [22] Privacy-preserving email forensics
    Armknecht, Frederik
    Dewald, Andreas
    DIGITAL INVESTIGATION, 2015, 14 : S127 - S136
  • [23] Privacy-Preserving IP Verification
    Mouris, Dimitris
    Gouert, Charles
    Tsoutsos, Nektarios Georgios
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (07) : 2010 - 2023
  • [24] A systematic review of privacy-preserving techniques for synthetic tabular health data
    Tobias Hyrup
    Anton D. Lautrup
    Arthur Zimek
    Peter Schneider-Kamp
    Discover Data, 3 (1):
  • [25] Random-data perturbation techniques and privacy-preserving data mining
    Hillol Kargupta
    Souptik Datta
    Qi Wang
    Krishnamoorthy Sivakumar
    Knowledge and Information Systems, 2005, 7 : 387 - 414
  • [26] A privacy-preserving ticketing system
    Verslype, Kristof
    De Decker, Bart
    NaessenS, Vincent
    Nigusse, Girma
    Lapon, Jorn
    Verhaeghe, Pieter
    DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 97 - +
  • [27] Privacy-Preserving Storage in the Fog
    Fabsich, Michael
    Kaaser, Dominik
    Karagiannis, Vasileios
    Schulte, Stefan
    2022 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2022), 2022, : 138 - 149
  • [28] Privacy-preserving collaborative filtering
    Polat, H
    Du, WL
    INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE, 2005, 9 (04) : 9 - 35
  • [29] Privacy-Preserving Classifier Learning
    Brickell, Justin
    Shmatikov, Vitaly
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 128 - 147
  • [30] Privacy-Preserving Deep Learning
    Shokri, Reza
    Shmatikov, Vitaly
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1310 - 1321