메뉴 건너뛰기




Volumn 2014-November, Issue November, 2014, Pages 21-29

Privacy preserving data quality assessment for high-fidelity data sharing

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DATA ANALYTICS; DATA PRIVACY; DATA REDUCTION; INFORMATION ANALYSIS; INFORMATION DISSEMINATION; RISK PERCEPTION; STATISTICAL TESTS;

EID: 84937694115     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2663876.2663885     Document Type: Conference Paper
Times cited : (14)

References (60)
  • 2
    • 0031988304 scopus 로고    scopus 로고
    • The impact of poor data quality on the typical enterprise
    • Thomas C Redman. The impact of poor data quality on the typical enterprise. Communications of the ACM, 41(2), 1998.
    • (1998) Communications of the ACM , vol.41 , Issue.2
    • Redman, T.C.1
  • 3
    • 0036036947 scopus 로고    scopus 로고
    • Data integration: A theoretical perspective
    • Maurizio Lenzerini. Data integration: A theoretical perspective. In PODS, 2002.
    • (2002) PODS
    • Lenzerini, M.1
  • 7
    • 0032640897 scopus 로고    scopus 로고
    • Consistent query answers in inconsistent databases
    • Marcelo Arenas, Leopoldo Bertossi, and Jan Chomicki. Consistent query answers in inconsistent databases. In PODS, 1999.
    • (1999) PODS
    • Arenas, M.1    Bertossi, L.2    Chomicki, J.3
  • 9
    • 57549084481 scopus 로고    scopus 로고
    • Dependencies revisited for improving data quality
    • Wenfei Fan. Dependencies revisited for improving data quality. In PODS, 2008.
    • (2008) PODS
    • Fan, W.1
  • 10
    • 84959912087 scopus 로고    scopus 로고
    • Improving data quality: Consistency and accuracy
    • Gao Cong, Wenfei Fan, Floris Geerts, Xibei Jia, and Shuai Ma. Improving data quality: Consistency and accuracy. In VLDB, 2007.
    • (2007) VLDB
    • Cong, G.1    Fan, W.2    Geerts, F.3    Jia, X.4    Ma, S.5
  • 11
    • 84882979330 scopus 로고    scopus 로고
    • Health insurance portability and accountability act of 1996
    • An Act
    • An Act. Health insurance portability and accountability act of 1996. Public Law, 104:191, 1996.
    • (1996) Public Law , vol.104 , pp. 191
  • 12
    • 77953306876 scopus 로고    scopus 로고
    • Predictive blacklisting as an implicit recommendation system
    • Fabio Soldo, Anh Le, and Athina Markopoulou. Predictive blacklisting as an implicit recommendation system. In INFOCOM, 2010.
    • (2010) INFOCOM
    • Soldo, F.1    Le, A.2    Markopoulou, A.3
  • 13
    • 79960561313 scopus 로고    scopus 로고
    • Collaborating against common enemies
    • Sachin Katti, Balachander Krishnamurthy, and Dina Katabi. Collaborating against common enemies. In IMC, 2005.
    • (2005) IMC
    • Katti, S.1    Krishnamurthy, B.2    Katabi, D.3
  • 17
    • 84937675712 scopus 로고    scopus 로고
    • Large-scale collection and sanitization of network security data: Risks and challenges
    • Phillip Porras and Vitaly Shmatikov. Large-scale collection and sanitization of network security data: Risks and challenges. In Workshop on New security paradigms, 2006.
    • (2006) Workshop on New Security Paradigms
    • Porras, P.1    Shmatikov, V.2
  • 20
    • 85084159849 scopus 로고    scopus 로고
    • Privacypreserving sharing and correction of security alerts
    • Patrick Lincoln, Phillip Porras, and Vitally Shmatikov. Privacypreserving sharing and correction of security alerts. In USENIX Security, 2004.
    • (2004) USENIX Security
    • Lincoln, P.1    Porras, P.2    Shmatikov, V.3
  • 21
    • 84863447066 scopus 로고    scopus 로고
    • SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics
    • Martin Burkhart, Mario Strasser, Dilip Many, and Xenofontas Dimitropoulos. SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics. In Usenix Security, 2010.
    • (2010) Usenix Security
    • Burkhart, M.1    Strasser, M.2    Many, D.3    Dimitropoulos, X.4
  • 23
    • 0010064835 scopus 로고    scopus 로고
    • DoD guidelines on data quality management
    • Phillip Cykana, Alta Paul, and Miranda Stern. DoD Guidelines on Data Quality Management. In IQ, pages 154-171, 1996.
    • (1996) IQ , pp. 154-171
    • Cykana, P.1    Paul, A.2    Stern, M.3
  • 24
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, 1999.
    • (1999) EUROCRYPT
    • Paillier, P.1
  • 25
    • 84867553981 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of paillier's probabilistic public-key system
    • I. Damgård and M. Jurik. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In Workshop on Practice and Theory in Public Key Cryptosystems, pages 119- 136, 2001.
    • (2001) Workshop on Practice and Theory in Public Key Cryptosystems , pp. 119-136
    • Damgård, I.1    Jurik, M.2
  • 26
    • 12244263240 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Michael Freedman, Kobbi Nissim, and Benny Pinkas. Efficient private matching and set intersection. In EUROCRYPT, 2004.
    • (2004) EUROCRYPT
    • Freedman, M.1    Nissim, K.2    Pinkas, B.3
  • 27
  • 28
    • 34547720829 scopus 로고    scopus 로고
    • Honest-verifier private disjointness testing without random oracles
    • S. Hohenberger and S. Weis. Honest-verifier private disjointness testing without random oracles. In PETS, 2006.
    • (2006) PETS
    • Hohenberger, S.1    Weis, S.2
  • 29
    • 84893240286 scopus 로고    scopus 로고
    • Fast and private computation of cardinality of set intersection and union
    • E. De Cristofaro, P. Gasti, and G. Tsudik. Fast and Private Computation of Cardinality of Set Intersection and Union. In CANS, 2012.
    • (2012) CANS
    • Cristofaro, E.D.1    Gasti, P.2    Tsudik, G.3
  • 30
    • 38049094878 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • Lea Kissner and Dawn Song. Privacy-preserving set operations. In CRYPTO, 2005.
    • (2005) CRYPTO
    • Kissner, L.1    Song, D.2
  • 31
    • 77958056561 scopus 로고    scopus 로고
    • Fast secure computation of set intersection
    • S. Jarecki and X. Liu. Fast secure computation of set intersection. In SCN, 2010.
    • (2010) SCN
    • Jarecki, S.1    Liu, X.2
  • 32
    • 84937689417 scopus 로고    scopus 로고
    • Scaling private set intersection to billion-element sets
    • Seny Kamara, Payman Mohassel, Mariana Raykova, and Saeed Sadeghian. Scaling private set intersection to billion-element sets. In FC, 2014.
    • (2014) FC
    • Kamara, S.1    Mohassel, P.2    Raykova, M.3    Sadeghian, S.4
  • 33
    • 84888990465 scopus 로고    scopus 로고
    • When private set intersection meets big data: An efficient and scalable protocol
    • Changyu Dong, Liqun Chen, and Zikai Wen. When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol. In CCS, 2013.
    • (2013) CCS
    • Dong, C.1    Chen, L.2    Wen, Z.3
  • 34
    • 85076311386 scopus 로고    scopus 로고
    • Faster private set intersection based on ot extension
    • Benny Pinkas, Thomas Schneider, and Michael Zohner. Faster private set intersection based on ot extension. In USENIX Security, 2014.
    • (2014) USENIX Security
    • Pinkas, B.1    Schneider, T.2    Zohner, M.3
  • 35
    • 57949088292 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • Dan Boneh and Brent Waters. Conjunctive, Subset, and Range Queries on Encrypted Data. In TCC, 2007.
    • (2007) TCC
    • Boneh, D.1    Waters, B.2
  • 37
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • Qian Wang, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou. Enabling public verifiability and data dynamics for storage security in cloud computing. In ESORICS. 2009.
    • (2009) ESORICS
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 38
    • 74049095755 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • Hovav Shacham and Brent Waters. Compact proofs of retrievability. In ASIACRYPT. 2008.
    • (2008) ASIACRYPT
    • Shacham, H.1    Waters, B.2
  • 39
    • 74049103479 scopus 로고    scopus 로고
    • PORs: Proofs of retrievability for large files
    • Ari Juels and Burton S Kaliski Jr. PORs: Proofs of retrievability for large files. In CCS, 2007.
    • (2007) CCS
    • Juels, A.1    Kaliski, B.S.2
  • 40
    • 77953295132 scopus 로고    scopus 로고
    • Privacypreserving public auditing for data storage security in cloud computing
    • Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou. Privacypreserving public auditing for data storage security in cloud computing. In INFOCOM, 2010.
    • (2010) INFOCOM
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 41
    • 0003625004 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Y. Lindell and B. Pinkas. Privacy Preserving Data Mining. In CRYPTO, 2000.
    • (2000) CRYPTO
    • Lindell, Y.1    Pinkas, B.2
  • 42
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • Rakesh Agrawal and Ramakrishnan Srikant. Privacy-preserving data mining. ACM Sigmod Record, 29(2), 2000.
    • (2000) ACM Sigmod Record , vol.29 , Issue.2
    • Agrawal, R.1    Srikant, R.2
  • 43
    • 84881255209 scopus 로고    scopus 로고
    • Privacy-preserving ridge regression on hundreds of millions of records
    • Valeria Nikolaenko, Udi Weinsberg, Stratis Ioannidis, Marc Joye, Dan Boneh, and Nina Taft. Privacy-preserving ridge regression on hundreds of millions of records. In S&P, 2013.
    • (2013) S&P
    • Nikolaenko, V.1    Weinsberg, U.2    Ioannidis, S.3    Joye, M.4    Boneh, D.5    Taft, N.6
  • 44
    • 84927517111 scopus 로고    scopus 로고
    • Privacy-preserving cooperative statistical analysis
    • Wenliang Du and Mikhail J Atallah. Privacy-preserving cooperative statistical analysis. In ACSAC, 2001.
    • (2001) ACSAC
    • Du, W.1    Atallah, M.J.2
  • 45
    • 85168150014 scopus 로고    scopus 로고
    • Private set intersection: Are garbled circuits better than custom protocols?
    • Y. Huang, D. Evans, and J. Katz. Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? In NDSS, 2012.
    • (2012) NDSS
    • Huang, Y.1    Evans, D.2    Katz, J.3
  • 46
    • 77958038685 scopus 로고    scopus 로고
    • Practical private set intersection protocols with linear complexity
    • E. De Cristofaro and G. Tsudik. Practical private set intersection protocols with linear complexity. In FC, 2010.
    • (2010) FC
    • Cristofaro, E.D.1    Tsudik, G.2
  • 47
    • 84893224383 scopus 로고    scopus 로고
    • Experimenting with fast private set intersection
    • E. De Cristofaro and G. Tsudik. Experimenting with fast private set intersection. In TRUST, 2012.
    • (2012) TRUST
    • Cristofaro, E.D.1    Tsudik, G.2
  • 48
    • 84937711715 scopus 로고    scopus 로고
    • Efficient and privacy-preserving common friend-finder protocols and applications
    • Do I know you?
    • Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N Asokan, and Ahmad-Reza Sadeghi. Do I know you?: Efficient and privacy-preserving common friend-finder protocols and applications. In ACSAC, 2013.
    • (2013) ACSAC
    • Nagy, M.1    Cristofaro, E.D.2    Dmitrienko, A.3    Asokan, N.4    Sadeghi, A.-R.5
  • 50
    • 84937697817 scopus 로고    scopus 로고
    • Public-key encrypted bloom filters with applications to supply chain integrity
    • Florian Kerschbaum. Public-key encrypted Bloom filters with applications to supply chain integrity. In Data and Applications Security and Privacy. 2011.
    • (2011) Data and Applications Security and Privacy
    • Kerschbaum, F.1
  • 52
    • 80755127495 scopus 로고    scopus 로고
    • Privacy-preserving queries over relational databases
    • Femi Olumofin and Ian Goldberg. Privacy-preserving Queries over Relational Databases. In PETS, 2010.
    • (2010) PETS
    • Olumofin, F.1    Goldberg, I.2
  • 53
  • 54
    • 24344436696 scopus 로고    scopus 로고
    • Prefixpreserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
    • Jun Xu, Jinliang Fan, Mostafa H Ammar, and Sue B Moon. Prefixpreserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme. In ICNP, 2002.
    • (2002) ICNP
    • Xu, J.1    Fan, J.2    Ammar, M.H.3    Moon, S.B.4
  • 55
  • 56
    • 77955220391 scopus 로고    scopus 로고
    • Playing devil's advocate: Inferring sensitive information from anonymized network traces
    • Scott E Coull, Charles V Wright, Fabian Monrose, Michael P Collins, Michael K Reiter, et al. Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. In NDSS, 2007.
    • (2007) NDSS
    • Coull, S.E.1    Wright, C.V.2    Monrose, F.3    Collins, M.P.4    Reiter, M.K.5
  • 57
    • 77955143560 scopus 로고    scopus 로고
    • Dialing privacy and utility: A proposed data-sharing framework to advance Internet research
    • Erin Kenneally and Kimberly Claffy. Dialing privacy and utility: A proposed data-sharing framework to advance Internet research. IEEE S&P, 8(4), 2010.
    • (2010) IEEE S&P , vol.8 , Issue.4
    • Kenneally, E.1    Claffy, K.2
  • 58
    • 70249116116 scopus 로고    scopus 로고
    • Evaluating the utility of anonymized network traces for intrusion detection
    • Kiran Lakkaraju and Adam Slagell. Evaluating the utility of anonymized network traces for intrusion detection. In SECURECOMM, 2008.
    • (2008) SECURECOMM
    • Lakkaraju, K.1    Slagell, A.2
  • 60
    • 84937690787 scopus 로고    scopus 로고
    • Titan Threat Intelligence System. http://www.gtresearchnews.gatech.edu/titan-threat-intelligence-system/, 2013.
    • (2013) Titan Threat Intelligence System


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.