• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yan Heping, Wang Zhengfei, Wang Wei, Shi Baile. Inference Based Security Database Auditing Framework[J]. Journal of Computer Research and Development, 2006, 43(9): 1630-1638.
Citation: Yan Heping, Wang Zhengfei, Wang Wei, Shi Baile. Inference Based Security Database Auditing Framework[J]. Journal of Computer Research and Development, 2006, 43(9): 1630-1638.

Inference Based Security Database Auditing Framework

More Information
  • Published Date: September 14, 2006
  • The development of information technology brings security database new challenges. Privacy principles are even being mandated internationally through legislations and guidelines, and this requires the security database to verify that it adheres to its declared data disclosure policy. An auditing system satisfies the above desiderata well, but only auditing the result of query is not enough, because malicious user can access sensitive information by inferring the result of query. This requires the auditing system to have the basic inference capacity. In this paper, a security database inference audit framework is proposed, which have the ability of MVD inference, FFD inference, and FD inference. At the same time, the auditing system keeps the properties of fast, precise, and fine-grained.
  • Related Articles

    [1]Han Bing, Wang Hao, Fang Min, Zhang Yongchao, Zhou Lu, Ge Chunpeng. Data Integrity Verification Scheme For Lightweight Devices in Cloud Storage Scenarios[J]. Journal of Computer Research and Development, 2024, 61(10): 2467-2481. DOI: 10.7544/issn1000-1239.202440489
    [2]Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J]. Journal of Computer Research and Development, 2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023
    [3]Xu Guangwei, Bai Yanke, Yan Cairong, Yang Yanbin, Huang Yongfeng. Check Algorithm of Data Integrity Verification Results in Big Data Storage[J]. Journal of Computer Research and Development, 2017, 54(11): 2487-2496. DOI: 10.7544/issn1000-1239.2017.20160825
    [4]Wang Huifeng, Li Zhanhuai, Zhang Xiao, Sun Jian, Zhao Xiaonan. A Self-Adaptive Audit Method of Data Integrity in the Cloud Storage[J]. Journal of Computer Research and Development, 2017, 54(1): 172-183. DOI: 10.7544/issn1000-1239.2017.20150900
    [5]Qin Zhiguang, Wang Shiyu, Zhao Yang, Xiong Hu, Wu Songyang. An Auditing Protocol for Data Storage in Cloud Computing with Data Dynamics[J]. Journal of Computer Research and Development, 2015, 52(10): 2192-2199. DOI: 10.7544/issn1000-1239.2015.20150509
    [6]Tan Shuang, He Li, Chen Zhikun, Jia Yan. A Method of Provable Data Integrity Based on Lattice in Cloud Storage[J]. Journal of Computer Research and Development, 2015, 52(8): 1862-1872. DOI: 10.7544/issn1000-1239.2015.20140610
    [7]Li Hui, Sun Wenhai, Li Fenghua, Wang Boyang. Secure and Privacy-Preserving Data Storage Service in Public Cloud[J]. Journal of Computer Research and Development, 2014, 51(7): 1397-1409.
    [8]Fu Yingxun, Luo Shengmei, Shu Jiwu. Survey of Secure Cloud Storage System and Key Technologies[J]. Journal of Computer Research and Development, 2013, 50(1): 136-145.
    [9]Xiao Da, Shu Jiwu, Chen Kang, Zheng Weimin. A Practical Data Possession Checking Scheme for Networked Archival Storage[J]. Journal of Computer Research and Development, 2009, 46(10): 1660-1668.
    [10]Wang Dan, Feng Dengguo, and Xu Zhen. An Approach to Data Sealing Based on Trusted Virtualization Platform[J]. Journal of Computer Research and Development, 2009, 46(8): 1325-1333.

Catalog

    Article views (740) PDF downloads (597) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return