-
RootNode
-
Co-operative College, Mandalay
-
Cooperative College, Phaunggyi
-
Co-operative University, Sagaing
-
Co-operative University, Thanlyin
-
Dagon University
-
Kyaukse University
-
Laquarware Technological college
-
Mandalay Technological University
-
Mandalay University of Distance Education
-
Mandalay University of Foreign Languages
-
Maubin University
-
Mawlamyine University
-
Meiktila University
-
Mohnyin University
-
Myanmar Institute of Information Technology
-
Myanmar Maritime University
-
National Management Degree College
-
Naypyitaw State Academy
-
Pathein University
-
Sagaing University
-
Sagaing University of Education
-
Taunggyi University
-
Technological University, Hmawbi
-
Technological University (Kyaukse)
-
Technological University Mandalay
-
University of Computer Studies, Mandalay
-
University of Computer Studies Maubin
-
University of Computer Studies, Meikhtila
-
University of Computer Studies Pathein
-
University of Computer Studies, Taungoo
-
University of Computer Studies, Yangon
-
University of Dental Medicine Mandalay
-
University of Dental Medicine, Yangon
-
University of Information Technology
-
University of Mandalay
-
University of Medicine 1
-
University of Medicine 2
-
University of Medicine Mandalay
-
University of Myitkyina
-
University of Public Health, Yangon
-
University of Veterinary Science
-
University of Yangon
-
West Yangon University
-
Yadanabon University
-
Yangon Technological University
-
Yangon University of Distance Education
-
Yangon University of Economics
-
Yangon University of Education
-
Yangon University of Foreign Languages
-
Yezin Agricultural University
-
New Index
-
Item
{"_buckets": {"deposit": "4248ede6-711d-4a52-8f79-40b3c16a1c14"}, "_deposit": {"id": "4396", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4396"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4396", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implement a Secure Method of Privacy-conscious Approach on SQL Query using bb-PIR", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Private retrieval of public data is importantwhen a client wants to query a public dataservice without revealing the query to the server.So, we want to use a practical and flexibleapproach for the private retrieval of public datacalled bounding box private informationretrieval (bb-PIR). The bb-PIR can make atradeoff between a cost of retrieval and thedegree of privacy. And bb-PIR can providesecure data communication between a client andthe server. Therefore, there is no doubt that bbPIR is more practical because of its lowercommunication cost. This paper will report howPrivate Information Retrieval (PIR) can helpusers keep their sensitive information in an SQLquery from being leaked. We will also show howto retrieve data from a relational database withbb-PIR by hiding sensitive constants contained inthe SQL query."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Bounding Box Private Information Retrieval (bb-PIR)"}, {"interim": "Private Information retrieval (PIR)"}, {"interim": "Structured Query Language (SQL)"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-10-23"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "9075.pdf", "filesize": [{"value": "154 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 154000.0, "url": {"url": "https://meral.edu.mm/record/4396/files/9075.pdf"}, "version_id": "bee8211b-2766-41bd-8b82-acdd3534f631"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Ninth International Conference On Computer Applications (ICCA 2011)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Nway, Zon Nyein"}, {"subitem_authors_fullname": "Kham, Nang Saing Moon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2011-05-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2331"}, "item_title": "Implement a Secure Method of Privacy-conscious Approach on SQL Query using bb-PIR", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004396", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-10-23"}, "publish_date": "2019-10-23", "publish_status": "0", "recid": "4396", "relation": {}, "relation_version_is_last": true, "title": ["Implement a Secure Method of Privacy-conscious Approach on SQL Query using bb-PIR"], "weko_shared_id": -1}
Implement a Secure Method of Privacy-conscious Approach on SQL Query using bb-PIR
http://hdl.handle.net/20.500.12678/0000004396
http://hdl.handle.net/20.500.12678/00000043968ce1c3dd-ef2e-422b-8330-b1e6cf32114c
4248ede6-711d-4a52-8f79-40b3c16a1c14
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Implement a Secure Method of Privacy-conscious Approach on SQL Query using bb-PIR | |||||
Language | en_US | |||||
Publication date | 2011-05-05 | |||||
Authors | ||||||
Nway, Zon Nyein | ||||||
Kham, Nang Saing Moon | ||||||
Description | ||||||
Private retrieval of public data is importantwhen a client wants to query a public dataservice without revealing the query to the server.So, we want to use a practical and flexibleapproach for the private retrieval of public datacalled bounding box private informationretrieval (bb-PIR). The bb-PIR can make atradeoff between a cost of retrieval and thedegree of privacy. And bb-PIR can providesecure data communication between a client andthe server. Therefore, there is no doubt that bbPIR is more practical because of its lowercommunication cost. This paper will report howPrivate Information Retrieval (PIR) can helpusers keep their sensitive information in an SQLquery from being leaked. We will also show howto retrieve data from a relational database withbb-PIR by hiding sensitive constants contained inthe SQL query. | ||||||
Keywords | ||||||
Bounding Box Private Information Retrieval (bb-PIR), Private Information retrieval (PIR), Structured Query Language (SQL) | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/2331 | |||||
Journal articles | ||||||
Ninth International Conference On Computer Applications (ICCA 2011) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |