Challenges of Privacy-Preserving OLAP Techniques

被引:0
|
作者
Gorlatykh, Andrey V. [1 ]
Zapechnikov, Sergey V. [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Moscow Engn Phys Inst, Dept Cryptol & Cybersecur, Moscow, Russia
关键词
On-line Analytical Processing (OLAP); information security; privacy; partly homomorphic encryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Over the last five years, on-line analytical processing (OLAP) became one of the essential information processing technologies. OLAP technology has been successfully used in different areas: retail, financial services, telecommunication, health care etc. Because of this security of data stored in Data Warehouses became one of the most important aspect of this technology, especially when we speaking about data privacy. We review existing privacy-preserving OLAP techniques and identify new challenges of this technology. In particular, OLAP databases are placed often in the untrusted clouds, so it is crucial to create techniques for evaluating widely used statistical functions (mean value, standard deviation, minimum, maximum, and so on) over the encrypted data. For this purpose, we review and compare encryption schemes with special features (partly homomorphic, order-preserving, deterministic etc.) and suggest architecture of application for private OLAP over the encrypted database.
引用
收藏
页码:404 / 408
页数:5
相关论文
共 50 条
  • [1] PRIVACY-PRESERVING OLAP FOR ACCURATE ANSWER
    Zhu, Youwen
    Huang, Liusheng
    Takagi, Tsuyoshi
    Zhang, Mingwu
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2012, 21 (01)
  • [2] Privacy-Preserving Learning Analytics: Challenges and Techniques
    Gursoy, Mehmet Emre
    Inan, Ali
    Nergiz, Mehmet Ercan
    Saygin, Yucel
    IEEE TRANSACTIONS ON LEARNING TECHNOLOGIES, 2017, 10 (01): : 68 - 81
  • [3] Privacy-Preserving Techniques in Biometric Systems: Approaches and Challenges
    Prakasha, K. Krishna
    Sumalatha, U.
    IEEE ACCESS, 2025, 13 : 32584 - 32616
  • [4] Privacy-Preserving OLAP: An Information-Theoretic Approach
    Zhang, Nan
    Zhao, Wei
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (01) : 122 - 138
  • [5] Privacy-preserving Techniques in Federated Learning
    Liu Y.-X.
    Chen H.
    Liu Y.-H.
    Li C.-P.
    Ruan Jian Xue Bao/Journal of Software, 2022, 33 (03): : 1057 - 1092
  • [6] Privacy-Preserving Biometric Authentication: Challenges and Directions
    Pagnin, Elena
    Mitrokotsa, Aikaterini
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [7] Privacy-Preserving Solutions for Blockchain: Review and Challenges
    Bernal Bernabe, Jorge
    Luis Canovas, Jose
    Hernandez-Ramos, Jose L.
    Torres Moreno, Rafael
    Skarmeta, Antonio
    IEEE ACCESS, 2019, 7 : 164908 - 164940
  • [8] Challenges of Privacy-Preserving Machine Learning in IoT
    Zheng, Mengyao
    Xu, Dixing
    Jiang, Linshan
    Gu, Chaojie
    Tan, Rui
    Cheng, Peng
    PROCEEDINGS OF THE 2019 INTERNATIONAL WORKSHOP ON CHALLENGES IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR INTERNET OF THINGS (AICHALLENGEIOT '19), 2019, : 1 - 7
  • [9] Privacy-preserving Techniques for Proximity Based LBS
    Freni, Dario
    MDM: 2009 10TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, 2009, : 387 - 388
  • [10] Smart Metering privacy-preserving techniques in a nutshell
    Souri, Hajer
    Dhraief, Amine
    Tlili, Syrine
    Drira, Khalil
    Belghith, Abdelfettah
    5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014), 2014, 32 : 1087 - 1094