Publications

Detailed Information

Controlled Query Evaluation Enforcing Privacy-Policy for Safe and Efficient Data Sharing : 안전하고 효율적인 데이터 공유를 위한 개인 보호 정책 기반의 질의 평가 및 제어

DC Field Value Language
dc.contributor.advisor염헌영-
dc.contributor.authorJo, Insoon-
dc.date.accessioned2017-07-13T08:58:36Z-
dc.date.available2017-07-13T08:58:36Z-
dc.date.issued2013-02-
dc.identifier.other000000008365-
dc.identifier.urihttps://hdl.handle.net/10371/119991-
dc.description학위논문 (박사)-- 서울대학교 대학원 : 컴퓨터공학부, 2013. 2. 염헌영.-
dc.description.abstractWith the growth in information access, comes the challenge of maintaining privacy and security on sensitive data in shared data storage. For instance, the Information Technology for Economic and Clinical Health (HITECH) Acts provisions penalize organizations who do not take measures to protect privacy of patient data even if the organization was unaware of such a duty. Thus, an efficient mechanism of fine-grained access control (FGAC) on such data should be considered. However, current techniques suffer from the possibility of revealing too much information or giving incorrect answers to aggregate queries. This dissertation targets data warehouse systems using SQL and aims for a generic approach to safeguard sensitive information stored in them while providing reasonably accurate query answers. It proposes improvements by considering properties of good security and defining levels of information revelation, and then develops an algorithm to evaluate user queries against a privacy policy. We assume a policy contains at least one rule and both rules and queries are written in SQL. A user query is evaluated against rules in the policy one after another. If the algorithm meets any rule with which the query is compliant, it stops and accepts the query as it is. Otherwise, it either rejects or rewrites the query by the configuration. Given each rule in a policy, its attributes are classified into four categories, which represent different levels of information revelation to prevent inference attacks and used to decide a querys compliance with it. For a query to be compliant with a given rule, all attributes of the query should be allowed by the rule. Whether an attribute of the query is permitted by the rule or not is determined by the category which the attribute belongs to. If the algorithm fails to meet any rule with which the query is compliant (i.e. there is no rule in the policy to allow all attributes of the query), it either rejects or rewrites the query. For rewriting, it chooses a rule with which the query is more compliant than any other rule in the policy, and rewrites the query so as to be compliant with the chosen rule. We built prototypes of privacy-policy enforcement using two typical data warehouse systems: database management system (DBMS) and Hadoop-based query engine. Traditionally, DBMS has maintained a large amount of information and supported efficient data processing for it. However, the rapid growth of data sets being collected and analyzed has made it run into limitations on scalability and processing time. As a promising solution to efficiently process huge amount of data, cloud computing has come to the fore. Not only to provide a familiar programming model for existing users but to ease the programming burden for writing queries, data warehouse systems in the Cloud support SQL. Evaluation of prototype systems demonstrates that the overhead from our privacy-policy enforcement is small and scales well with typical query sizes.-
dc.description.tableofcontentsChapter 1 Introduction 1
1.1 Necessity for access control 1
1.2 Deficiencies in existing access control mechanisms 2
1.3 Motivational example 4
1.4 Overview and contribution 7
1.5 Dissertation outline 9

Chapter 2 Related Work 10
2.1 Privacy definitions 10
2.2 FGAC and query rewriting 13
2.3 Limitation of prior FGAC frameworks 17
2.4 Limitation of prior privacy enforcement frameworks in cloud environments 20

Chapter 3 Policy Specification and Properties 24
3.1 Four levels of information revelation 25
3.2 Privacy and accuracy by by-range rules 31
3.3 k-anonymity support 33

Chapter 4 Design 35
4.1 Notation and assumptions 35
4.2 Attribute classification 36
4.3 Evaluation against a policy with a single rule 39
4.4 Evaluation against a policy with multiple rules 47
4.5 Evaluation of a query with sub-queries 52
4.6 Policy integration 55
4.7 Satisfying FGAC properties 56

Chapter 5 Performance Evaluation 59
5.1 Overview of prototype implementation 59
5.2 Evaluation using popular databases 60
5.2.1 Experimental setup 60
5.2.2 Experimental results 61
5.2.3 Complexity analysis 64
5.3 Evaluation using Hadoop-based query engines 66
5.3.1 Experimental setup 66
5.3.2 Experimental results 66

Chapter 6 Conclusion 70

Bibliography 72

Abstract 78
-
dc.formatapplication/pdf-
dc.format.extent1326634 bytes-
dc.format.mediumapplication/pdf-
dc.language.isoen-
dc.publisher서울대학교 대학원-
dc.subjectPrivacy-
dc.subjectFine-Grained Access Control-
dc.subjectPolicy Enforcement-
dc.subjectQuery Evaluation-
dc.subjectDatabase-
dc.subjectData Warehouse System for Hadoop-
dc.subject.ddc621-
dc.titleControlled Query Evaluation Enforcing Privacy-Policy for Safe and Efficient Data Sharing-
dc.title.alternative안전하고 효율적인 데이터 공유를 위한 개인 보호 정책 기반의 질의 평가 및 제어-
dc.typeThesis-
dc.contributor.AlternativeAuthor조인순-
dc.description.degreeDoctor-
dc.citation.pages81-
dc.contributor.affiliation공과대학 컴퓨터공학과-
dc.date.awarded2013-02-
Appears in Collections:
Files in This Item:

Altmetrics

Item View & Download Count

  • mendeley

Items in S-Space are protected by copyright, with all rights reserved, unless otherwise indicated.

Share