2021
DOI: 10.1109/tcyb.2020.3027962
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Memetic Algorithm for Outsourced Database Fragmentation

Abstract: Data privacy and utility are two essential requirements in outsourced data storage. Traditional techniques for sensitive data protection, such as data encryption, affect the efficiency of data query and evaluation. By splitting attributes of sensitive associations, database fragmentation techniques can help protect data privacy and improve data utility. In this article, a distributed memetic algorithm (DMA) is proposed for enhancing database privacy and utility. A balanced best random distributed framework is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 56 publications
(19 citation statements)
references
References 53 publications
0
18
0
Order By: Relevance
“…Furthermore, how to evolve the network depth and topology of CNNs is worthy of further research. Also, more efficient optimization paradigms can be considered for CNN optimization in different scenarios, where potential optimization paradigms include data-driven optimization [61], large-scale optimization [62], dynamic optimization [63], many-objective optimization [64], multi-modal optimization [65], expensive optimization [66], and parallel [67] and distributed optimization [68]. In addition, the SHEDA is potential for solving more challenging learning tasks in complex real-world applications, such as healthcare application [69] and autonomous robot application [70], which will be further explored and studied.…”
Section: J Further Discussionmentioning
confidence: 99%
“…Furthermore, how to evolve the network depth and topology of CNNs is worthy of further research. Also, more efficient optimization paradigms can be considered for CNN optimization in different scenarios, where potential optimization paradigms include data-driven optimization [61], large-scale optimization [62], dynamic optimization [63], many-objective optimization [64], multi-modal optimization [65], expensive optimization [66], and parallel [67] and distributed optimization [68]. In addition, the SHEDA is potential for solving more challenging learning tasks in complex real-world applications, such as healthcare application [69] and autonomous robot application [70], which will be further explored and studied.…”
Section: J Further Discussionmentioning
confidence: 99%
“…Generally, privacy and utility [ 31 , 32 ] are two significant metrics to measure privacy pretection technology. In this section, we implement experiments on a real-world dataset to evaluate the performance of our scheme in terms of the privacy and the utility.…”
Section: Evaluation Setupmentioning
confidence: 99%
“…For the other hand, a review for a POI indicates that the owner has visited this POI. The attacker can obtain the historical trajectory of the target user by collecting (such as cyber attack [ 4 ], information sharing [ 5 ], etc.) and analyzing the historical review data of the target user.…”
Section: Introductionmentioning
confidence: 99%
“…This considers a logically outrageous issue with the devices since they are alive anyway, identifying inaccurately. Therefore, services fail at the application level either due to middleware erroror the physical layer [6]. Therefore, failures in such dynamic and interactive systems can result in user displeasure.…”
Section: Figure 1 Architecture Of Sensor Network Applicationmentioning
confidence: 99%