Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "4248ede6-711d-4a52-8f79-40b3c16a1c14"}, "_deposit": {"id": "4396", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4396"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4396", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implement a Secure Method of Privacy-conscious Approach on SQL Query using bb-PIR", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Private retrieval of public data is importantwhen a client wants to query a public dataservice without revealing the query to the server.So, we want to use a practical and flexibleapproach for the private retrieval of public datacalled bounding box private informationretrieval (bb-PIR). The bb-PIR can make atradeoff between a cost of retrieval and thedegree of privacy. And bb-PIR can providesecure data communication between a client andthe server. Therefore, there is no doubt that bbPIR is more practical because of its lowercommunication cost. This paper will report howPrivate Information Retrieval (PIR) can helpusers keep their sensitive information in an SQLquery from being leaked. We will also show howto retrieve data from a relational database withbb-PIR by hiding sensitive constants contained inthe SQL query."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Bounding Box Private Information Retrieval (bb-PIR)"}, {"interim": "Private Information retrieval (PIR)"}, {"interim": "Structured Query Language (SQL)"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-10-23"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "9075.pdf", "filesize": [{"value": "154 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 154000.0, "url": {"url": "https://meral.edu.mm/record/4396/files/9075.pdf"}, "version_id": "bee8211b-2766-41bd-8b82-acdd3534f631"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Ninth International Conference On Computer Applications (ICCA 2011)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Nway, Zon Nyein"}, {"subitem_authors_fullname": "Kham, Nang Saing Moon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2011-05-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2331"}, "item_title": "Implement a Secure Method of Privacy-conscious Approach on SQL Query using bb-PIR", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004396", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-10-23"}, "publish_date": "2019-10-23", "publish_status": "0", "recid": "4396", "relation": {}, "relation_version_is_last": true, "title": ["Implement a Secure Method of Privacy-conscious Approach on SQL Query using bb-PIR"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Implement a Secure Method of Privacy-conscious Approach on SQL Query using bb-PIR

http://hdl.handle.net/20.500.12678/0000004396
http://hdl.handle.net/20.500.12678/0000004396
8ce1c3dd-ef2e-422b-8330-b1e6cf32114c
4248ede6-711d-4a52-8f79-40b3c16a1c14
None
Preview
Name / File License Actions
9075.pdf 9075.pdf (154 Kb)
Publication type
Article
Upload type
Publication
Title
Title Implement a Secure Method of Privacy-conscious Approach on SQL Query using bb-PIR
Language en_US
Publication date 2011-05-05
Authors
Nway, Zon Nyein
Kham, Nang Saing Moon
Description
Private retrieval of public data is importantwhen a client wants to query a public dataservice without revealing the query to the server.So, we want to use a practical and flexibleapproach for the private retrieval of public datacalled bounding box private informationretrieval (bb-PIR). The bb-PIR can make atradeoff between a cost of retrieval and thedegree of privacy. And bb-PIR can providesecure data communication between a client andthe server. Therefore, there is no doubt that bbPIR is more practical because of its lowercommunication cost. This paper will report howPrivate Information Retrieval (PIR) can helpusers keep their sensitive information in an SQLquery from being leaked. We will also show howto retrieve data from a relational database withbb-PIR by hiding sensitive constants contained inthe SQL query.
Keywords
Bounding Box Private Information Retrieval (bb-PIR), Private Information retrieval (PIR), Structured Query Language (SQL)
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/2331
Journal articles
Ninth International Conference On Computer Applications (ICCA 2011)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:40:40.419740
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL