{"created":"2020-09-01T13:14:42.995280+00:00","id":3655,"links":{},"metadata":{"_buckets":{"deposit":"698c2c41-40eb-4bd6-82c7-1e7810da6b3a"},"_deposit":{"id":"3655","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3655"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3655","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Privacy-conscious Approach on SQL Query using bb-PIR","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Privacy information retrieval (PIR) can be viewed as a service between a user and a database. Private retrieval of public data is critical in these days when a client wants to query a public data service without expressing the query to the server. The user wants to retrieve some item from the database without knowing which item is retriveved. Most current PIR protocals are not appropriate to provide user privacy from a large database. This is because of their computational complexity that is linear in the size of the database. And the database still learns which item is being retrieved by the user. Therefore, this paper uses a practical and flexible approach for the private retrieval of public data called bounding box private information retrieval (bb-PIR). In order words, this paper shows how to retrieve data from a relational database with bb-PIR by hiding sensitive constants contained in the SQL query."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-26"}],"displaytype":"preview","filename":"Privacy.pdf","filesize":[{"value":"6 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3655/files/Privacy.pdf"},"version_id":"03f09144-f0b4-4a11-adff-93def141b17c"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Sixth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Nwey, Zun Nyein"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2011-12-29"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1386"},"item_title":"Privacy-conscious Approach on SQL Query using bb-PIR","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-26","publish_status":"0","recid":"3655","relation_version_is_last":true,"title":["Privacy-conscious Approach on SQL Query using bb-PIR"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T03:55:40.920155+00:00"}