Optimal Privacy-Aware Path in Hippocratic Databases

نویسندگان

  • Min Li
  • Xiaoxun Sun
  • Hua Wang
  • Yanchun Zhang
چکیده

Privacy becomes a major concern for both customers and enterprises in today’s corporate marketing strategies, many research efforts have been put into developing new privacy-aware technologies. Among them, Hippocratic databases are one of the important mechanisms to guarantee the respect of privacy principles in data management, which adopt purpose as a central concept associated with each piece of data stored in the databases. The proposed mechanism provides basic principles for future database systems protecting privacy of data as a founding tenet. However, Hippocratic databases do not allow to distinguish which particular method is used for fulfilling a purpose. Especially, the issues like purpose hierarchies, task delegations and minimal privacy cost are missing from the proposed mechanism. In this paper, we extend these mechanisms in order to support interorganizational business processes in Hippocratic databases. A comprehensive approach for negotiation of personal information between customers and enterprises based on user preferences is developed when enterprises offer their clients a number of ways to fulfill a service. We organize purposes into purpose directed graphs through AND/OR decomposition, which supports task delegations and distributed authorizations. Specially, customers have controls of deciding how to get a service fulfilled on the basis of their personal feeling of trust for any service customization. Quantitative analysis is performed to characterize privacy penalties dealing with privacy cost and customer’s trust. Finally, efficient algorithms are given to guarantee the minimal privacy cost and maximal customer’s trust involved in a business process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hippocratic Databases

The Hippocratic Oath has guided the conduct of physicians for centuries. Inspired by its tenet of preserving privacy, we argue that future database systems must include responsibility for the privacy of data they manage as a founding tenet. We enunciate the key privacy principles for such Hippocratic database systems. We propose a strawman design for Hippocratic databases, identify the technica...

متن کامل

Security and privacy for database systems

Database security is a discipline that seeks methods to protect data stored at DBMSs from intrusions, improper modifications, theft, and unauthorized disclosure of private information. This is realized through a set of security services, which meet the security requirements of both the system and the data sources. A number of different techniques and approaches has been developed to assure data...

متن کامل

From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach

Privacy protection is a growing concern in the marketplace. Yet, privacy requirements and mechanisms are usually retro-fitted into a pre-existing design which may not be able to accommodate them due to potential conflicts with functional requirements. We propose a procedure for automatically extracting privacy requirements from databases supporting access control mechanisms for personal data (h...

متن کامل

Implementing Hippocratic Database in Legacy Applications

In many organizations, legacy applications are bread earners. Even though the technology, language, technique or platform may be obsolete, such legacy applications either earn money for the business or helps in smooth functioning of the business. Legacy applications handle sensitive information thereby making security of such crucial legacy applications equally critical for an organization. The...

متن کامل

Towards a Hippocratic Log File Architecture

The World Wide Web (WWW) is fast becoming the central location for goods, services and information. The very factors that make the Internet such a powerful medium, combine to make the Internet a treasure trove of personal information regarding individual Web users. Users’ movements and information are logged as they navigate the Web, often without their knowledge and definitely without their ex...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009