Abstract
The current privacy-preserving researches focus on single-owner privacy. However, multi-owner privacy is also a type of widespread privacy. In order to research the privacy-preserving method for multi-owner privacy, it is necessary to find a formal description, which is not concerned by the current researches. In this paper, a privacy definition is proposed, as well as a classhierarchy of privacy type for clarification of the relationship between single-owner privacy and multi-owner privacy. The characteristics of multi-owner privacy and a formal description based on these characteristics are introduced.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bertino, E., Sandhu, R.: Database Security-—Concepts, Approached, and Challenge. IEEE Transaction On Dependable and Secure Computing 2(1)
Xiao, X., Tao, Y.: Personalized Privacy Preservation. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data (2006)
Byun, J.-W., Bertino, E., Li, N.: Micro-views, or on how to protect privacy while enhancing data usability – Concepts and Challenges. SIGMOD Record 35(1)
Byun, J.-W., Bertino, E., Li, N.: Purpose Based Access Control of Complex Data for Privacy Protection. In: SACMAT 2005 (2005)
Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE, pp. 217–228
Yao, C., Wang, L., Wang, X.S., Jajodia, S.: Indistinguishability: The Other Aspect of Privacy. Journal of Secure Data Management, 1–17
Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression Technical Report Technical Report, SRI International
Sweeney, L.: k-anonymity: A Model For Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10 (5), 557–570
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: ICDE 2006 (2006)
Machanavajjhala, A., Gehrke, J., Kifer, D.: l-diversity: Privacy beyond k-anonymity. In: ICDE 2006 (2006)
Ren, Y., Cheng, F., Peng, Z., Huang, X., Song, W.: A Privacy Policy Conflict Detection Method for Multi-owner Privacy Data Protection. Journal of Electronic Commerce Research, 23–39
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic Databases. In: Proc. 28th Int’l Conf. on Very Large Data Bases
Ren, Y., Luo, M., Tang, Z., Ye, L.: A Composite Privacy Protection Model. In: Second International Workshop in Information and Computer Security, Nara, Japan (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ren, Y., Xiao, ZT. (2012). A Formal Description for Multi-owner Privacy. In: Lei, J., Wang, F.L., Li, M., Luo, Y. (eds) Network Computing and Information Security. NCIS 2012. Communications in Computer and Information Science, vol 345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35211-9_87
Download citation
DOI: https://doi.org/10.1007/978-3-642-35211-9_87
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35210-2
Online ISBN: 978-3-642-35211-9
eBook Packages: Computer ScienceComputer Science (R0)