Skip to main content

A Formal Description for Multi-owner Privacy

  • Conference paper
Network Computing and Information Security (NCIS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 345))

Included in the following conference series:

  • 1329 Accesses

Abstract

The current privacy-preserving researches focus on single-owner privacy. However, multi-owner privacy is also a type of widespread privacy. In order to research the privacy-preserving method for multi-owner privacy, it is necessary to find a formal description, which is not concerned by the current researches. In this paper, a privacy definition is proposed, as well as a classhierarchy of privacy type for clarification of the relationship between single-owner privacy and multi-owner privacy. The characteristics of multi-owner privacy and a formal description based on these characteristics are introduced.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bertino, E., Sandhu, R.: Database Security-—Concepts, Approached, and Challenge. IEEE Transaction On Dependable and Secure Computing 2(1)

    Google Scholar 

  2. Xiao, X., Tao, Y.: Personalized Privacy Preservation. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data (2006)

    Google Scholar 

  3. Byun, J.-W., Bertino, E., Li, N.: Micro-views, or on how to protect privacy while enhancing data usability – Concepts and Challenges. SIGMOD Record 35(1)

    Google Scholar 

  4. Byun, J.-W., Bertino, E., Li, N.: Purpose Based Access Control of Complex Data for Privacy Protection. In: SACMAT 2005 (2005)

    Google Scholar 

  5. Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE, pp. 217–228

    Google Scholar 

  6. Yao, C., Wang, L., Wang, X.S., Jajodia, S.: Indistinguishability: The Other Aspect of Privacy. Journal of Secure Data Management, 1–17

    Google Scholar 

  7. Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression Technical Report Technical Report, SRI International

    Google Scholar 

  8. Sweeney, L.: k-anonymity: A Model For Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10 (5), 557–570

    Google Scholar 

  9. LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: ICDE 2006 (2006)

    Google Scholar 

  10. Machanavajjhala, A., Gehrke, J., Kifer, D.: l-diversity: Privacy beyond k-anonymity. In: ICDE 2006 (2006)

    Google Scholar 

  11. Ren, Y., Cheng, F., Peng, Z., Huang, X., Song, W.: A Privacy Policy Conflict Detection Method for Multi-owner Privacy Data Protection. Journal of Electronic Commerce Research, 23–39

    Google Scholar 

  12. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic Databases. In: Proc. 28th Int’l Conf. on Very Large Data Bases

    Google Scholar 

  13. Ren, Y., Luo, M., Tang, Z., Ye, L.: A Composite Privacy Protection Model. In: Second International Workshop in Information and Computer Security, Nara, Japan (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ren, Y., Xiao, ZT. (2012). A Formal Description for Multi-owner Privacy. In: Lei, J., Wang, F.L., Li, M., Luo, Y. (eds) Network Computing and Information Security. NCIS 2012. Communications in Computer and Information Science, vol 345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35211-9_87

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35211-9_87

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35210-2

  • Online ISBN: 978-3-642-35211-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics