2007
DOI: 10.1007/s10207-007-0030-1
|View full text |Cite
|
Sign up to set email alerts
|

Protecting data privacy through hard-to-reverse negative databases

Abstract: A set DB of data elements can be represented in terms of its complement set, known as a negative database. That is, all of the elements not in DB are represented, and DB itself is not explicitly stored. This method of representing data has certain properties that are relevant for privacy enhancing applications.The paper reviews the negative database (N DB) representation scheme for storing a negative image compactly, and it proposes using a collection of N DBs to represent a single DB, that is, one N DB is ass… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 54 publications
(41 citation statements)
references
References 37 publications
0
41
0
Order By: Relevance
“…Informally, we say that a data set has been sanitized if it is impossible or very difficult for an attacker to infer sensitive information from the data. Difficulty could either result from a high average-case computational complexity [18] or from the amount of extra information an attacker needs to collect in order to breach privacy [35,36,10]. Thus it is clear that when designing a method for sanitizing data, one should also reason about attacks available to an attacker.…”
Section: Introductionmentioning
confidence: 99%
“…Informally, we say that a data set has been sanitized if it is impossible or very difficult for an attacker to infer sensitive information from the data. Difficulty could either result from a high average-case computational complexity [18] or from the amount of extra information an attacker needs to collect in order to breach privacy [35,36,10]. Thus it is clear that when designing a method for sanitizing data, one should also reason about attacks available to an attacker.…”
Section: Introductionmentioning
confidence: 99%
“…There are a several algorithms in the literature for creating negative databases [8,12,9]. Moreover, since it was shown in [9] that negative databases are linked by a simple transformation to boolean satisfiability formulas, algorithms for generating formulas can be adapted to generate N DBs.…”
Section: Generating a Negative Databasementioning
confidence: 99%
“…First, is the previous work on negative databases: In [11] the negative database representation is introduced; [8] uses a similar algorithm for generating N DBs and introduces some interesting applications, but relies on NP-hardness for its security. In [12] the issue of attaching a code is proposed, albeit it is used with a different purpose, and [7] is concerned with generating N DBs efficiently. Both consider ways of creating secure N DBs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…As the profile consists of invalid entities, it is called a complement profile or negative profile. This complement profile represents the negative abstraction of valid credentials and actually is the problem specific realization of the negative database described in [12]. The use of negative authentication for a system login application was first examined in [10].…”
Section: Negative Authentication (Filtering) Modelmentioning
confidence: 99%