Database fragmentation with encryption: Under which semantic constraints and a priori knowledge can two keep a secret?

9Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Database outsourcing to semi-honest servers raises concerns against the confidentiality of sensitive information. To hide such information, an existing approach splits data among two supposedly mutually isolated servers by means of fragmentation and encryption. This approach is modelled logic-orientedly and then proved to be confidentiality preserving, even if an attacker employs some restricted but nevertheless versatile class of a priori knowledge to draw inferences. Finally, a method to compute a secure fragmentation schema is developed. © 2013 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Biskup, J., & Preuß, M. (2013). Database fragmentation with encryption: Under which semantic constraints and a priori knowledge can two keep a secret? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7964 LNCS, pp. 17–32). https://doi.org/10.1007/978-3-642-39256-6_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free