Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


August Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the August 2021 Edition of the journal. The last date of research paper submission is July 15, 2021.

Securing Anonymous and Confidential Database through Privacy Preserving Updates

Poonam B Joshi, Prashant Jawade Published in Security

IJAIS Proceedings on International Conference and workshop on Advanced Computing 2013
Year of Publication: 2013
© 2012 by IJAIS Journal
Series icwac Number 4
Download full text
  1. Poonam B Joshi and Prashant Jawade. Article: Securing Anonymous and Confidential Database through Privacy Preserving Updates. IJAIS Proceedings on International Conference and workshop on Advanced Computing 2013 ICWAC(4):30-35, July 2013. BibTeX

    	author = "Poonam B Joshi and Prashant Jawade",
    	title = "Article: Securing Anonymous and Confidential Database through Privacy Preserving Updates",
    	journal = "IJAIS Proceedings on International Conference and workshop on Advanced Computing 2013",
    	year = 2013,
    	volume = "ICWAC",
    	number = 4,
    	pages = "30-35",
    	month = "July",
    	note = "Published by Foundation of Computer Science, New York, USA"


Typically for economic gain, someone wrongfully obtains and uses another person's personal data in a way that involves fraud or deception. So Privacy of database is a necessity. In this paper we propose a system of updating the confidential database with preserving the privacy of it. Anonymization means identifying information is removed from original data to protect personal or private information. Data anonymization can be performed in different ways but in this paper k-anonymization approach is used. Suppose one person X having his own k-anonymous database and needs to determine whether database is still k-anonymous if tuple inserted by another person Y. For some applications (for example, Patient's record), database needs to be confidential, so access to the database is strictly controlled. The confidentiality of the database managed by the owner is violated once others have access to the contents of the database. Thus, problem is to check whether the database inserted with the tuple is still k-anonymous without letting the owner X and others (Y) to know the content of the tuple and database respectively. In this paper, we propose two methods solving this problem on suppression and generalization based k-anonymous and confidential database. Beside we are dealing with the case of malicious parties by the introduction of non-colluding third party.


  1. N. R. Adam and J. C. Wortmann, "Security-Control Methods for Statistical Databases: A Comparative Study," ACM Computing Surveys, vol. 21, no. 4, pp. 515-556, 1989.
  2. L. Sweeney, "k-Anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002.
  3. S. Zhong, Z. Yang, and R. N. Wright, "Privacy-Enhancing k-Anonymization of Customer Data," Proc. ACM Symp. Principles of Database Systems (PODS), 2005.
  4. J. W. Byun, T. Li, E. Bertino, N. Li, and Y. Sohn, "Privacy-Preserving Incremental Data Dissemination," J. Computer Security,vol. 17, no. 1, pp. 43-68, 2009.
  5. U. Maurer, "The Role of Cryptography in Database Security,"Proc. ACM SIGMOD Int'l Conf. Management of Data, 2004.
  6. H. Hacigu¨mu¨ s¸, B. Iyer, C. Li, and S. Mehrotra, "Executing SQLover Encrypted Data in the Database-Service-Provider Model,"Proc. ACM SIGMOD Int'l Conf. Management of Data, 2002.
  7. D. X. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searches on Encrypted Data," Proc. IEEE Symp. Security and Privacy, 2000.
  8. M. K. Reiter and A. Rubin, "Crowds: Anonymity with Web Transactions," ACM Trans. Information and System Security (TISSEC), vol. 1, no. 1, pp. 66-92, 1998.
  9. R. Agrawal, A. Evfimievski, and R. Srikant, "Information Sharing across Private databases," Proc. ACM SIGMOD Int'l Conf. Management of Data, 2003.
  10. K. Wang and B. Fung, "Anonymizing Sequential Releases," Proc. ACM Knowledge Discovery and Data Ming Conf. (KDD), 2006.
  11. D. Boneh, G. di Crescenzo, R. Ostrowsky, and G. Persiano, "Public Key Encryption with Keyword Search," Proc. Euro crypt Conf. , 2004.
  12. M. Reed, P. Ryerson, and D. Goldschlag, "Anonymous Connections and Onion Routing," IEEE J. Selected Areas in Comm. , vol. 16, no. 4, pp. 482-494, May 1998.
  13. Kargupta H. Datta, S. Q. Wang and K. Sivakumar,"On the privacy preserving properties of random perturbation techniques"IEEEICDM, 2003.
  14. Privacy –Preserving Updates to Anonymous and Confidential Databases, Alberto Trombetta, Wei Jiang, Elisa Bertino and Lorenzo Bossi Department of Computer Science and Communication, University of Insure, Italy 2011.
  15. Current Developments of k-Anonymous Data Releasing, Jiuyong Li, Hua Wang, Huidong Jin, Jianming Yong, School of Computer and Information Science, University of South Australia, Mawson Lakes Adelaide, Australia, 5095.


Suppression, Generalization, K-anonymity