2012 IEEE 28th International Conference on Data Engineering 2012
DOI: 10.1109/icde.2012.138
|View full text |Cite
|
Sign up to set email alerts
|

DObjects+: Enabling Privacy-Preserving Data Federation Services

Abstract: Abstract-The emergence of cloud computing implies and facilitates managing large collections of highly distributed, autonomous, and possibly private databases. While there is an increasing need for services that allow integration and sharing of various data repositories, it remains a challenge to ensure the privacy, interoperability, and scalability for such services. In this paper we demonstrate a scalable and extensible framework that is aimed to enable privacy preserving data federations. The framework is b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 20 publications
(33 reference statements)
0
2
0
Order By: Relevance
“…This is in line with the MW architecture displayed in [28]. Papakonstantinou et al [6] and Jurczyk et al [30] displayed an architecture in which each mediator of the first mediator layer is connected to just one wrapper and vice versa, showing that this is also a feasible solution in cases where mediators are only needed for translation. The first mediator layer can be used to mediate between wrappers over paradigmatically similar data sources or data sources that have an overlapping or connected domain.…”
Section: Querysupporting
confidence: 70%
“…This is in line with the MW architecture displayed in [28]. Papakonstantinou et al [6] and Jurczyk et al [30] displayed an architecture in which each mediator of the first mediator layer is connected to just one wrapper and vice versa, showing that this is also a feasible solution in cases where mediators are only needed for translation. The first mediator layer can be used to mediate between wrappers over paradigmatically similar data sources or data sources that have an overlapping or connected domain.…”
Section: Querysupporting
confidence: 70%
“…Alert sharing mechanisms can still be improved. Depending on the security policy, on the criticality level of the alerts and on the security level of the AD, a customizable anonymity of alerts based on [34,35] could be used in order to be able to share even the most critical alerts and therefore improving the correlation.…”
Section: Discussionmentioning
confidence: 99%
“…Out of a total of 61 privacy papers, one paper [28] uses k-anonymity, and another paper [29] uses l-diversity and tcloseness but also differential privacy to anonymize data. Furthermore, Cao and Karras [30] introduce a successor to tcloseness, called β-likeness which they claim is more informative and comprehensible.…”
Section: B Data Integritymentioning
confidence: 99%