A novel vertical fragmentation method for privacy protection based on entropy minimization in a relational database (Q2333930)

From MaRDI portal
Revision as of 15:53, 2 February 2024 by Import240129110113 (talk | contribs) (Added link to MaRDI item.)
scientific article
Language Label Description Also known as
English
A novel vertical fragmentation method for privacy protection based on entropy minimization in a relational database
scientific article

    Statements

    A novel vertical fragmentation method for privacy protection based on entropy minimization in a relational database (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    13 November 2019
    0 references
    Summary: Many scholars have attempted to use an encryption method to resolve the problem of data leakage in data outsourcing storage. However, encryption methods reduce data availability and are inefficient. Vertical fragmentation perfectly solves this problem. It was first used to improve the access performance of the relational database, and nowadays some researchers employ it for privacy protection. However, there are some problems that remain to be solved with the vertical fragmentation method for privacy protection in the relational database. First, current vertical fragmentation methods for privacy protection require the user to manually define privacy constraints, which is difficult to achieve in practice. Second, there are many vertical fragmentation solutions that can meet privacy constraints; however, there are currently no quantitative evaluation criteria evaluating how effectively solutions can protect privacy more effectively. In this article, we introduce the concept of information entropy to quantify privacy in vertical fragmentation, so we can automatically discover privacy constraints. Based on this, we propose a privacy protection model with a minimum entropy fragmentation algorithm to achieve minimal privacy disclosure of vertical fragmentation. Experimental results show that our method is suitable for privacy protection with a lower overhead.
    0 references
    privacy protection
    0 references
    vertical fragmentation
    0 references
    information entropy
    0 references
    quantify privacy
    0 references
    relational database
    0 references

    Identifiers