Efficient algorithms for the key representation auditing scheme.
Abstract—A statistical database (SDB) publishes statistical queries (such as sum, average, count, etc) on subsets of records. Sometimes by stitching the answers of some statistics, a malicious user (snooper) may be able to deduce confidential information about some individuals. The key representati...
| Main Authors: | , |
|---|---|
| Format: | Citation Index Journal |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/3226/ http://scholars.utp.edu.my/id/eprint/3226/1/Asim_IJCEE2009.pdf |
| _version_ | 1848659368578383872 |
|---|---|
| author | Asim Abdallah, Elshiekh Dominic P, Dhanapal Durai |
| author_facet | Asim Abdallah, Elshiekh Dominic P, Dhanapal Durai |
| author_sort | Asim Abdallah, Elshiekh |
| building | UTP Institutional Repository |
| collection | Online Access |
| description | Abstract—A statistical database (SDB) publishes statistical
queries (such as sum, average, count, etc) on subsets of records. Sometimes by stitching the answers of some statistics, a malicious user (snooper) may be able to deduce confidential information about some individuals. The key representation auditing scheme is proposed to guarantee the security of online and dynamic SDBs. The core idea is to convert the original database into key representation database (KRDB), also this scheme involves converting each new user query from string representation into key representation query (KRQ), and stores it in the Audit Query table (AQ table). Three audit stages are proposed to repel the attacks of the snooper to the confidentiality of the individuals. In this paper, efficient algorithms for these stages are presented, namely the First Stage Algorithm (FSA), the Second Stage Algorithm (SSA),
and the Third Stage Algorithm (TSA). These algorithms enable
the key representation auditor (KRA) to conveniently specify
the illegal queries which could lead to disclosing the SDB. Also, cost estimation for this scheme is performed, and we illustrate the saving in block accesses (CPU time) and storage space that are attainable when a KRDB is used. |
| first_indexed | 2025-11-13T07:29:19Z |
| format | Citation Index Journal |
| id | oai:scholars.utp.edu.my:3226 |
| institution | Universiti Teknologi Petronas |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-13T07:29:19Z |
| publishDate | 2009 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | oai:scholars.utp.edu.my:32262017-01-19T08:25:16Z http://scholars.utp.edu.my/id/eprint/3226/ Efficient algorithms for the key representation auditing scheme. Asim Abdallah, Elshiekh Dominic P, Dhanapal Durai QA75 Electronic computers. Computer science Abstract—A statistical database (SDB) publishes statistical queries (such as sum, average, count, etc) on subsets of records. Sometimes by stitching the answers of some statistics, a malicious user (snooper) may be able to deduce confidential information about some individuals. The key representation auditing scheme is proposed to guarantee the security of online and dynamic SDBs. The core idea is to convert the original database into key representation database (KRDB), also this scheme involves converting each new user query from string representation into key representation query (KRQ), and stores it in the Audit Query table (AQ table). Three audit stages are proposed to repel the attacks of the snooper to the confidentiality of the individuals. In this paper, efficient algorithms for these stages are presented, namely the First Stage Algorithm (FSA), the Second Stage Algorithm (SSA), and the Third Stage Algorithm (TSA). These algorithms enable the key representation auditor (KRA) to conveniently specify the illegal queries which could lead to disclosing the SDB. Also, cost estimation for this scheme is performed, and we illustrate the saving in block accesses (CPU time) and storage space that are attainable when a KRDB is used. 2009-08 Citation Index Journal PeerReviewed application/pdf en http://scholars.utp.edu.my/id/eprint/3226/1/Asim_IJCEE2009.pdf Asim Abdallah, Elshiekh and Dominic P, Dhanapal Durai (2009) Efficient algorithms for the key representation auditing scheme. [Citation Index Journal] |
| spellingShingle | QA75 Electronic computers. Computer science Asim Abdallah, Elshiekh Dominic P, Dhanapal Durai Efficient algorithms for the key representation auditing scheme. |
| title | Efficient algorithms for the key representation auditing scheme. |
| title_full | Efficient algorithms for the key representation auditing scheme. |
| title_fullStr | Efficient algorithms for the key representation auditing scheme. |
| title_full_unstemmed | Efficient algorithms for the key representation auditing scheme. |
| title_short | Efficient algorithms for the key representation auditing scheme. |
| title_sort | efficient algorithms for the key representation auditing scheme. |
| topic | QA75 Electronic computers. Computer science |
| url | http://scholars.utp.edu.my/id/eprint/3226/ http://scholars.utp.edu.my/id/eprint/3226/1/Asim_IJCEE2009.pdf |