Next Article in Journal
Construction and Simulation of Composite Measures and Condensation Model for Designing Probabilistic Computational Applications
Next Article in Special Issue
The Augmented Approach towards Equilibrated Nexus Era into the Wireless Rechargeable Sensor Network
Previous Article in Journal
m-Polar Fuzzy Soft Weighted Aggregation Operators and Their Applications in Group Decision-Making
Previous Article in Special Issue
Vector Field Convolution-Based B-Spline Deformation Model for 3D Segmentation of Cartilage in MRI
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Vertical Fragmentation Method for Privacy Protection Based on Entropy Minimization in a Relational Database

1
College of Computer, National University of Defense Technology, Changsha 410073, China
2
Science and Technology on Parallel and Distributed Laboratory, National University of Defense Technology, Changsha 410073, China
*
Author to whom correspondence should be addressed.
Current address: The College of Computer, National University of Defense Technology, Changsha 410073, China.
These authors contributed equally to this work.
Symmetry 2018, 10(11), 637; https://doi.org/10.3390/sym10110637
Submission received: 16 October 2018 / Revised: 8 November 2018 / Accepted: 12 November 2018 / Published: 14 November 2018
(This article belongs to the Special Issue Information Technology and Its Applications 2021)

Abstract

:
Many scholars have attempted to use an encryption method to resolve the problem of data leakage in data outsourcing storage. However, encryption methods reduce data availability and are inefficient. Vertical fragmentation perfectly solves this problem. It was first used to improve the access performance of the relational database, and nowadays some researchers employ it for privacy protection. However, there are some problems that remain to be solved with the vertical fragmentation method for privacy protection in the relational database. First, current vertical fragmentation methods for privacy protection require the user to manually define privacy constraints, which is difficult to achieve in practice. Second, there are many vertical fragmentation solutions that can meet privacy constraints; however, there are currently no quantitative evaluation criteria evaluating how effectively solutions can protect privacy more effectively. In this article, we introduce the concept of information entropy to quantify privacy in vertical fragmentation, so we can automatically discover privacy constraints. Based on this, we propose a privacy protection model with a minimum entropy fragmentation algorithm to achieve minimal privacy disclosure of vertical fragmentation. Experimental results show that our method is suitable for privacy protection with a lower overhead.

1. Introduction

With the increase of human activities, more and more personal data needs to be stored. Some enterprises and individuals outsource their data to storage service providers. However, outsourcing storage gives rise to new security risks. A major problem is that the data is stored on external storage providers, so owners lose control over their data, potentially exposing them to improper access and dissemination. For example, in 2007, the well-known cloud service provider Salesforce [1] leaked a large amount of data due to security issues.
A current issue is how to ensure that outsourced data does not suffer from private leakage, even if the intruders obtain the original data. Currently, the most widely used method to protect outsourced data is encryption. At the same time, in order to ensure the availability of data, in the field of encryption technology, there are homomorphic encryption techniques [2], searchable encryption techniques [3,4] and the like. However, from the user’s point of view, the use of encryption technology is a huge burden. Encryption technology is very inefficient in operations such as database queries. Other commonly used data outsourcing methods include anonymization such as k-anonymity [5,6], l-diversity [7], and t-closeness [8]. Still, these methods limit the availability of the outsourced data.
An interesting method used to ensure both the availability and privacy of outsourced data is vertical fragmentation. Vertical fragmentation is not specifically designed to protect data security. It is primarily used in relational databases to improve database access performance and optimize storage. It splits a large table into multiple small tables and stores the information on multiple different servers. When the user submits a query request, the system will translate it into multiple requests which are executed concurrently on different servers. In this way, the efficiency of database querying is greatly improved. The vertical fragmentation method assumes that privacy is generated by the associations among data. For example, if the name and phone number in a database are leaked separately, the attacker could not obtain the knowledge of which number belongs to whom. However, if the name and phone number are leaked together, the attacker will obtain accurate privacy information. Vertical fragmentation splits the database into different servers, greatly reducing the risk of leaking the entire database. Thus, we can use vertical fragmentation to protect the privacy of an outsourced database. In addition, vertical fragmentation has a big advantage of maintaining outsourced data availability compared to the use of encryption and anonymization techniques, as these latter methods do not store the original data.
However, there are some problems with vertical fragmentation concerning privacy protection. First, it is very difficult for users to specify privacy constraints. In practice, users need to understand the semantics of each attribute and then determine if there are privacy constraints. Some weakly related privacy constraints are difficult for users to find, especially when there are many attributes in the database. Second, there are many vertical fragmentation methods that satisfy privacy constraints. In order to evaluate which method is better, De Capitani di Vimercat’s approach simulates the frequency of access to all attributes and ultimately chooses the method with the best access efficiency to perform the vertical fragmentation. In fact, the access data for attributes are impossible to know in advance.
Compared with De Capitani di Vimercat’s method, our research focuses on optimizing vertical fragmentation to eliminate user-defined privacy constraints and evaluate the effectiveness of privacy protection. We propose a new approach to vertically fragment a relational database to ensure the privacy and availability of the outsourced data. The approach consists of an entropy-based method to quantify the privacy of outsourcing data and a greedy algorithm to achieve privacy protection. In summary, we make the following contributions:
(1) We introduce the concept of information entropy and give an example of entropy calculation for a sample database, thus avoiding the need for the user to manually define privacy constraints in vertical fragmentation. We can calculate the entropy value of any number of attributes to determine which attributes together have a greater probability of having privacy constraints.
(2) We implement a vertical fragmentation method based on a greedy algorithm to minimize entropy. There are many solutions for vertically fragmenting databases. In order to minimize the risk of privacy leakage per fragmentation, we need to make the entropy of each fragment as small as possible. We propose a greedy algorithm to minimize the entropy for vertical fragmentation, which also works with low overhead.
The rest of this paper is structured as follows. Section 2 introduces related works. Section 3 describes the problem statement. We introduce our approach in Section 4. The experimental results are discussed in Section 5. In Section 6, we discuss the limitations and extensibility of our work. Conclusions are given in Section 7.

2. Related Work

In this section, we first introduce related work on vertical fragmentation with a focus on privacy protection (Section 2.1), and then we describe the research on information entropy (Section 2.2).

2.1. Vertical Fragmentation for Privacy Protection

With the development of encryption technology, encryption technology has been considered the greatest method for privacy protection. Encryption technology is inefficienct at performing queries. To perform the query on encrypted data, researchers proposed the indexing methods. Hacigumus et al. [9] proposed the bucket-based index methods. Hore et al. [10] present an efficient bucket-based index method. Wang et al. [11] proposed a hash-based index method. However, the indexing methods can’t resist inference attacks [12], and Order Preserving Encryption (OPE) [13] methods solve this problem by performing range query.
These encryption methods to protect privacy do not solve the problem of how to efficiently execute queries. There is no doubt that querying on encrypted data is very inefficient. An interesting method to achieve the goal of privacy protection and efficiently query is vertical fragmentation. Vertical fragmentation is mainly used to improve database access performance, since vertical fragmentation stores attributes together that are frequently accessed by queries. De Capitani di Vimercat et al. were the first to use vertical fragmentation for privacy protection. As reported in Refs. [14,15,16,17,18,19,20], De Capitani di Vimercat et al. used vertical fragmentation to protect the privacy of a relational database. They employed the user defined privacy constraints to complete the vertical fragmentation. Considering that there are many solutions to satisfy privacy constraints, they employed the user’s query load to compute the query efficient optimal solution. Xiang et al. [21] suggested that the user’s query load on the outsourced data was dynamically changing, so they proposed an adaptive partitioning strategy. Biskup et al. [22] used vertical fragmentation to protect confidentiality. Their model consists of two domains: one for storing encrypted data and one for trusted local domains which store fragments containing highly sensitive data without encrypting them. However, this method is not efficient. In order to solve the overhead in the query processing of data encryption methods, Ganapathy et al. [23] proposed distributing data storage for secure database services, in which data is stored on multiple servers. They also used the concept of privacy constraints to achieve a heuristic greedy algorithm for the distribution problem. Partitioning the queries for the servers was achieved using a bottom-up state-based algorithm. For multi-relational databases, Bkakria et al. [24] defined an approach for the privacy protection of sensitive information in outsourced data, based on a combination of fragmentation and encryption.

2.2. Information Entropy

Shannon’s theory of information entropy [25] solves the basic theory of quantifying and communicating information. Earlier studies of information entropy to measure privacy are those by Diaz [26] and Serjantov et al. [27], who proposed the use of information entropy to measure the anonymity of anonymous communication systems. Assuming that the purpose of the attacker is to determine the true identity of the sender (or receiver) of the message, each user in the system can be estimated to be the true sender or receiver of the message with a certain probability. The attacker guesses that a user is a real sender or receiver, which is expressed as a random variable X. Let p ( x ) be the probability function of X, and S ( X ) be the set of possible values of X. In this way, we use the entropy H ( x ) to quantify the system’s privacy level:
H ( X ) = p ( x ) log 2 p ( x ) .
For example, when the set S ( X ) is {1, 2} and the probability of each is 50%, then H ( X ) = 1. If the only value of the random variable X is 1, then the probability of taking the value of 1 is 100%. Accordingly, H ( X ) = 0. Therefore, the greater the entropy of the random variable X, the greater the dispersion of X. The more discrete the value, the greater the probability that a record is identified, and the higher the risk of information being leaked. If the entropy of the attribute is 0, it means that the value of the attribute may equally correspond to all the records equally, and thus the security is also the highest; it is hard for an attacker to identify the message sender or receiver.

3. Problem Statement

To provide privacy protection with vertical fragmentation, we first examine the meaning of vertical fragmentation for privacy protection, in general. We use an example to explain it and show that the current vertical fragmentation method is inefficient and unrealistic. Then, we introduce automated vertical fragmentation technology, which is the approach needed to quantify the privacy. Finally, we give the evaluation criteria of our method.

3.1. Vertical Fragmentation with Privacy Constraints

De Capitani di Vimercat et al. first proposed a vertical fragmentation strategy to protect privacy in a relational database. In De Capitani di Vimercat’s research, privacy is defined by the user, in terms of privacy constraints. A privacy constraint corresponds to a set of attributes of a relational database. The attributes in the set together may lead to privacy leakage.
Definition 1.
Privacy Constraints. For a simple relationship R, it consists of attributes a 1 , a 2 , a 3 , ... a n . All privacy constraints are a subset of this attribute set, that is, the set of privacy constraints c { a 1 , a 2 , a n } .
For example, in a medical system, a patient’s information sheet consists of their social security number (SSN), name, date of birth (DoB), zip code, disease, and physician, as shown in Table 1. De Capitani di Vimercat believed that some attributes together will cause the risk of a privacy leak. For example, the SSN and disease together form a privacy constraint, as they could disclose private information if leaked together. However, it is meaningless for only the SNN or only the disease information to be acquired by others; this does not cause a loss of privacy.
De Capitani di Vimercat reported that the SSN together with other attributes can be considered as privacy constraints, as described by c 0 , ...c 5 . Similarly, the name is also considered very sensitive. Privacy constraints c 6 , ...c 9 show that the name paired with other attributes presents a privacy risk. Privacy constraints c 10 indicate that, with the birthday, zip code, and disease information together, one can infer the patient’s name, acting as a quasi-identifier. Similarly, with the birthday, zip code, and physician together, one can also infer the name and SSN, as privacy constraint c 11 describes. Privacy constraints c 0 to c 11 are manually defined by the user.
Definition 2.
Fragmentation. Let R ( a 1 , a 2 , a n ) be a relation schema, and the fragmentation result is F = { f 1 , f 2 , f p } , where these fragments satisfy:
(i) 
f i F , i [ 1 , p ] , f i { a 1 , , a n } ,
(ii) 
f i , f j F , i j : f i f j = ,
(iii) 
f 1 f 2 f p = { a 1 , , a n } .
Condition (i) represents that only attributes of the relation R are considered by the fragmentation, condition (ii) ensures unlinkability between different fragments and condition (iii) guarantees that all attributes are fragmented.
Using these privacy constraints, De Capitani di Vimercat divided the patients’ information sheet into four blocks { {SSN}, {name}, {DoB, zip code}, {disease, physician} }. Next, they were stored on four different servers that do not communicate with each other. Thus, even if one server is compromised due to an attack, the entire relational database would not be leaked; that is, “two can keep a secret” [28]. This is the core concept of vertical fragmentation for privacy protection in De Capitani di Vimercat’s research: that is, to break the original relationships for the purpose of privacy protection.
However, De Capitani di Vimercat’s research still has some flaws. First, we need to know the semantics of each attribute as well as which attributes together may cause privacy leaks. Just like the example above, we have to make sure that the SSN and name attributes are sensitive, and recognize that they will cause privacy leaks along with other attributes. Second, some privacy constraints are not easily found in semantics, such as the privacy constraint c 10 = {DoB, zip code, and disease} in the above patients’ information sheet. This is very difficult to apply to actual problem-solving. In reality, the number of attributes will be very large, and their relationships will be very complicated, so manually defined privacy constraints are not realistic. Third, there are many vertical fragmentation schemes that can satisfy the privacy constraints. For example, { {SSN}, {name}, {DoB, disease}, {zip code, physician} } is also a good scheme. However, De Capitani di Vimercat does not provide evaluation criteria to judge the quality of these schemes.

3.2. Evaluation Standard

We consider our model, as shown in Figure 1. It is composed of three main components: (1) The trusted client, which is the trusted party responsible for fragmenting and distributing the data to different cloud service providers (CSPs); (2) the CSPs, which are responsible for storing, querying, and retrieving data, and (3) the protocol that the trusted client and CSPs communicate by.
In our proposed research, we assume that the attacker can obtain the data of a certain CSP through the network, but that the CSPs do not communicate with each other, so the risk of privacy leakage is concentrated on a single CSP. Our goal is to ensure the protection of private information on a single CSP. Based on the analysis of the example of the patients’ information sheet, below is a list of the types of tasks that must be accomplished with our approach.
(1) Correct Fragmentation: Verify that the privacy constraints are broken, so that fragmentation on a single CSP will not cause privacy leaks. Our approach must first ensure the most basic privacy protection requirements to break the potential privacy constraints that exist in relational databases. We must ensure there are no privacy leaks in the fragmentation of data, one can completely determine the records in the database, and so are very likely to disclose privacy when paired together.
Definition 3.
Correct Fragmentation. Let R ( a 1 , a 2 , a n ) be a relation schema, the fragmentation result be F = { f 1 , f 2 , f p } , and C ( c 0 , c 1 , c t ) be the privacy constraints. One correct fragmenting scheme must meet Definition 1 and the following requirements:
c i C , i [ 1 , t ] , c i { f 1 , , f p } .
As shown by example of the patients’ information sheet, with the scheme F = { { S S N } , { n a m e } , { D o B , d i s e a s e } , { z i p c o d e , p h y s i c i a n } } , the privacy constraints c 0 , ...c 11 are not a subset of the fragment f i .
(2) Minimal fragmentation: This is a simple metric of the fragmentation scheme to avoid excessive fragments. Intuitively, if there are n attributes of the data to be fragmented, we can simply divide it into n fragments. Thus, the risk of privacy leakage is also lower than other schemes. However, if we completely divide all attributes, it will lead to higher database query overhead.
Definition 4.
Minimal fragmentation. Let R ( a 1 , a 2 , a n ) be a relation schema. There are fragmentation schemes F satisfy definition 3, F i is the minimal fragmentation scheme, iff
F j , j i : # F i # F j .
Here, # indicates the number of collection elements. # F i represents the number of fragments of scheme F i . De Capitani di Vimercat et al. translate the problem into the problem of computing maximum weighted clique of the fragmentation graph and implemented it with the Ordered Binary Decision Diagrams(OBDDs) [29]. Their methods are based on heuristics algorithm and cannot get the optimal solution.
(3) Lower Risk of Information Disclosure: Each fragment contains a portion of private information that is less than the total amount of private information. There are many kinds of vertical fragmentation methods that can satisfy condition (1), but the various vertical fragmentation methods differ in that each fragment contains a different amount of information. In the patients’ information sheet, both scheme (a) { {SSN}, {name}, {DoB, zip code}, {disease, physician} } and scheme (b) { {SSN}, {name}, {DoB, disease}, {zip code, physician} } are vertical fragmentation solutions. However, the amount of information they contain is different; thus, we need to reduce the amount of information contained in each fragment as much as possible. The greater the amount of information contained in the fragment, the greater the risk of information leakage. Suppose there are s fragments, and the amount of information contained in each fragment i is I ( i ) . To evaluate the risk of information leakage of the scheme, we need to minimize the sum of the squares of the information I ( i ) 2 .
Definition 5.
Lower Risk of Information Leakage. Let R ( a 1 , a 2 , a n ) be a relation schema. There are fragmentation schemes (a) F a = { f a 1 , f a 2 , f a p 1 } and (b) F b = { f b 1 , f b 2 , f b p 2 } , when
I a = i = 1 p 1 I i 2 , I b = i = 1 p 2 I i 2 , I a < I b .
I a is an evaluation of the risk of information disclosure of the scheme (a), and I b is the evaluation of the risk of information disclosure of the scheme (b). This is to say scheme (a) has lower information than scheme (b).
The first statement indicates that our approach should achieve the goal of privacy protection, while the second statement indicates that the number of fragments needs to be minimized. The last statement indicates that we should minimize the potential risk of information disclosure. Our goal is to meet the above three requirements, which is equivalent to a multi-objective constrained optimization problem [30].

4. Approach

In this section, we describe the method to obtain the goal of privacy protection with minimal information disclosure. Our approach is implemented in three steps. First, we introduce the concept of entropy values to quantify private information. In this way, we can automatically discover privacy constraints to complete the fragmentation (Section 4.1). Second, we use the privacy constraints calculated in step 1 to get the number of minimal fragmentation (Section 4.2). Finally, we implement a minimum entropy fragmentation algorithm based on the greedy strategy, through which we can minimize the entropy of each fragment (Section 4.3).

4.1. Information Entropy to Quantify Privacy

To automatically discover privacy constraints, we need a method to quantify privacy. As an effective tool for measuring information, information entropy has proven to be an important contribution to the field of communications. As privacy is a kind of information, we can naturally consider using entropy to quantify it [31].
First, we assume that the set of attributes to be fragmentated is table A (a 1 , a 2 , a 3 , ...a n ), with n attributes kept in m records r 1 ,r 2 ,..r m . We can calculate the overall entropy of the table as follows:
E N ( A ) = i = 1 s p ( r i ) log 2 p ( r i ) , s m , 0 p ( r i ) 1 , p ( r i ) = 1 .
E N ( A ) represents the entropy of table A, s indicates the number of records that are not repeated in the record r, and p ( r i ) represents the probability of r i in table A. For example, the patient’s information sheet has six records (r 1 to r 6 ). None of the records are repeated, thus:
p ( r i ) = 1 / 6 ( i = 1 , 2 , 6 ) , E N ( A ) = ( 1 / 6 log 2 1 / 6 + 1 / 6 log 2 1 / 6 + 1 / 6 log 2 1 / 6 + 1 / 6 log 2 1 / 6 + 1 / 6 log 2 1 / 6 + 1 / 6 log 2 1 / 6 ) = log 2 6 2 . 5850 .
It can be proved that, if there is no repeat record, then the entropy value is log 2 m . We can define a probability distribution that a record X i in the database takes a value a via
Pr ( X i = a ) = # { r j ( i ) = a , 1 j m } / m .
Here, the property X i is a random variable of the attribute, and # represents the number of elements in the collection. For example, in the patient’s information sheet:
Pr ( d i s e a s e = f l u ) = 2 / 6 = 1 / 3 , Pr ( p h y s i c i a n = M . W h i t e ) = 2 / 6 = 1 / 3 .
Thus, the entropy of an attribute a j is:
E N ( a j ) = a a i Pr ( a i = a ) log 2 Pr ( a i = a ) .
As Table 1 shows for the patients’ information sheet, the attributes’ entropies can calculated as follows:
E N ( S S N ) = ( 1 / 6 log 2 1 / 6 + 1 / 6 log 2 1 / 6 + 1 / 6 log 2 1 / 6 + 1 / 6 log 2 1 / 6 + 1 / 6 log 2 1 / 6 + 1 / 6 log 2 1 / 6 ) = log 2 6 2 . 5850 ,
E N ( p h y s i c i a n ) = ( 2 / 6 log 2 2 / 6 + 2 / 6 log 2 2 / 6 + 1 / 6 log 2 1 / 6 + 1 / 6 log 2 1 / 6 ) = 1 / 3 log 2 36 1 . 2925 .
The joint entropy can be calculated as follows:
E N ( S S N , n a m e ) = log 2 6 2 . 5850 , E N ( D o B , d i s e a s e ) 2 . 2516 .
The joint entropy treats multiple attributes as a new attribute. As shown above E N ( S S N , n a m e ) , we treat SSN and name as a new single attribute. That is to say, E N ( A , B ) = E N ( B , A ) .
Theorem 1.
Let R be a relation schema, A and B are attributes, E N ( A ) and E N ( B ) represent their entropy, and E N ( A , B ) is the joint entropy of attributes A and B; thus,
E N ( A , B ) max { E N ( A ) , E N ( B ) } .
Proof of Theorem 1.
Assume that attribute A consists of the records r a 1 , r a 2 , r a m , and B consists of r b 1 , r b 2 , r b m :
E N ( A ) = E N ( r a 1 , r a 2 , r a m ) ,
E N ( B ) = E N ( r b 1 , r b 2 , r b m ) ,
E N ( A , B ) = E N ( r a 1 r b 1 , r a 2 r b 2 , r a m r b m ) .
Here, ∞ is a string concatenation function. From the definition of entropy, we know that the more non-repeating records there are, the larger the entropy. There are records r a i and r a j of attribute A. If r a i = r a j , after adding attribute B, it will become r a i r b i and r a j r b j . However, r a i r b i = r a j r b j is true only when r a i = r a i and r b j = r b j . E N ( A , B ) will reduce the number of repeating records, so  E N ( A , B ) max { E N ( A ) , E N ( B ) } . □
Theorem 2.
Let R be a relation schema, A and B are attributes, E N ( A ) and E N ( B ) represent their entropy, E N ( A , B ) is the joint entropy of attributes A and B, and thus
E N ( A , B ) E N ( A ) + E N ( B ) .
Proof of Theorem 2.
Mathematical induction. Assume that attribute A consists of the records r a 1 , r a 2 , r a m , B consists of r b 1 , r b 2 , r b m , and n represents the number of non-repeating records of attribute B, thus:
When n = 1 , n = 1 represents the records in attribute B exactly the same, r b 1 = r b 2 = = r b m and E N ( B ) = 0 , thus:
E N ( A , B ) = E N ( r a 1 r b 1 , r a 2 r b 2 , r a m r b m )
= E N ( r a 1 , r a 2 , r a m ) + 0 = E N ( A ) + E N ( B ) .
That is to say,
E N ( A , B ) E N ( A ) + E N ( B ) .
Suppose when n = t , E N ( A , B ) t E N ( A ) t + E N ( B ) t , there are x duplicate r b k records in attribute B, # B R = # { r b i | r b i = r b k } = x , x 1 . We mark them with B R = { r n b 1 , r n b 2 , r n b x } , and the corresponding elements in attribute A are recorded as A R = { r n a 1 , r n a 2 , r n a x } . Here, r n b 1 = r n b 2 = = r n b x = r b k . At the same time, we mark attributes A and B to remove these records as A A R and B B R :
E N ( A , B ) t E N ( A ) t + E N ( B ) t .
When n = t + 1 , we know that the number of repeating records is minus one. There are x 1 duplicate r b k records in attribute B; we need to discuss in two cases:
(1) # { r a i r b i | r b i = r b k } = x , this means # { r n a 1 , r n a 2 , r n a x } = x , thus
E N ( B ) t = i = 1 # { B B R } p i log 2 p i + ( x m ) log 2 ( x m ) ,
E N ( B ) t + 1 = i = 1 # { B B R } p i log 2 p i + ( x 1 m ) log 2 ( x 1 m ) + ( 1 m ) log 2 ( 1 m ) .
When we chang the duplicate record in attribute B, r a i and r a i r b i will not change, thus
E N ( A ) t + 1 = E N ( A ) t ,
E N ( A , B ) t + 1 = E N ( A , B ) t .
From the above, we know that we only need to prove E N ( B ) t + 1 E N ( B ) t > 0 :
E N ( B ) t + 1 E N ( B ) t = 1 m log 2 x x ( x 1 ) x 1 .
It is easy to prove that, when x > 1 and m > 1 , the above formula is greater than zero, so
E N ( A , B ) t + 1 = E N ( A , B ) t E N ( A ) t + 1 + E N ( B ) t + 1 .
(2) # { r a i r b i | r b i = r b k } = y , y < x . We know that the number of duplicate records is y. There are at least two duplicate records in the set AR, thus y 2 , we mark them as R N A . When the number of repeating records in the set BR is minus one, if the records in the set R B corresponding to the R N A do not change, it will become situation (1). We only need to consider that the situation of the set R B corresponding to the R N A are changing, thus:
E N ( A ) t + 1 = E N ( A ) t ,
E N ( B ) t = i = 1 # { B B R } p i log 2 p i + ( x m ) log 2 ( x m ) ,
E N ( B ) t + 1 = i = 1 # { B B R } p i log 2 p i + ( x 1 m ) log 2 ( x 1 m ) + ( 1 m ) log 2 ( 1 m ) ,
E N ( A , B ) t = i = 1 s p i log 2 p i + ( y m ) log 2 ( y m ) ,
E N ( A , B ) t + 1 = i = 1 s p i log 2 p i + ( y 1 m ) log 2 ( y 1 m ) + ( 1 m ) log 2 ( 1 m ) .
This is equivalent to proof
E N ( A , B ) t + 1 E N ( A , B ) t E N ( B ) t + 1 E N ( B ) t .
This is to say, we need to prove
1 m log 2 y y ( y 1 ) y 1 1 m log 2 x x ( x 1 ) x 1 .
We know that, when m > 1 and x > y > 1 , f ( x ) = 1 m log 2 x x ( x 1 ) x 1 is a monotonically increasing function. Obviously, E N ( A , B ) t + 1 E N ( A ) t + 1 + E N ( B ) t + 1 .
In summary, we can get the following conclusion:
E N ( A , B ) E N ( A ) + E N ( B ) .
 □
With this knowledge, we can automatically discover the privacy constraints that exist in Table 1: EN(SSN) = EN(name) = 2.585 = EN(total table), which indicates that these attributes have privacy constraints, corresponding to c 0 to c 9 . Likewise, EN(DoB, zip code, disease) = EN(DoB, zip code, physician) = 2.585 = EN(total table) also indicates these attributes have privacy constraints, corresponding to c 10 and c 11 . We know from the definition of entropy that entropy is the amount of information an attribute contains. That is to say, both SSN and name contain the information amount of the entire table of the patients’ information sheets, similar to the primary key. Thus, they are susceptible to privacy leaks along with other attributes.We proposed an algorithm that automatically generates privacy constraints, shown in Algorithm 1.
Algorithm 1 Automatically Generates Privacy Constraints Algorithm (Table A, Constraints)
Input: Input parameters TableA : the table to be fragmented
Output: Output Constraints : the privacy constraints
 1: [ m , n ] = s i z e ( T a b l e A )
 2: E n t r o p y _ t a b l e A = c a l E n t r o p y ( T a b l e A , m )
 3: for each A i { A 1 , A n } do
 4:    A t t r i _ e n t r o p y = c a l E n t r o p y ( A i , m ) ;
 5: end for
 6: for i = 2 to n − 1 do
 7:    C o m b i n a t i o n s ( i ) = c a l C o m b i n a t i o n s ( i , A t t r i _ e n t r o p y , E n t r o p y _ t a b l e A )
 8:   for j = 1 to s i z e ( C o m b i n a t i o n s ( i ) ) do
 9:     S t r =
10:   for each A k C o m b i n a t i o n s ( i , j ) do
11:      S t r = S t r + A k
12:   end for
13:    C o m b _ e n t r o p y ( i , j ) = c a l E n t r o p y ( S t r , m )
14:   if C o m b _ e n t r o p y ( i , j ) > E n t r o p y _ t a b l e A × t h r e s h o l d then
15:      C o n s t r a i n t s ( i , j ) = C o m b i n a t i o n s ( j ) ;
16:   end if
17:  end for
18: end for
The automatically generated privacy constraints algorithm takes the table to be split as input, and the set of constraints result is saved in the array C o n s t r a i n t s . Line 1 calculates the number of records and the number of attributes, marked as m and n, respectively. Line 2 calculates the entropy of the whole table. The function c a l E n t r o p y takes the set of attributes and the number of records as input, using Equations (3) and  (4) to calculate the entropy of the attribute. Lines 3 to 5 calculate the entropy of a single attribute in TableA. In lines 6 to 18, we calculate the constraints from 2 to n− 1 dimension. In Line 7, the function c a l C o m b i n a t i o n s calculates the combination of possible privacy constraints for the number of different attributes based on the entropy of all attributes. If i = 3 , it will return all ternary combinations that may have privacy constraints. The basis for determining whether it can become a privacy constraint is based on Theorems 1 and 2. In lines 8 to 17, we decide whether these possible combinations will become privacy constraints. On line 13, we calculate the entropy of the possible combination of privacy constraints. On line 14, we set a t h r e s h o l d ( 0 < t h r e s h o l d 1 ) that the user can adjust. The larger the t h r e s h o l d , the stronger the privacy constraint requirement. When the entropy of possible combination exceeds the entropy of entire table multiplied by threshold, we think that there is a privacy constraint so that we can automatically discover privacy constraints. There is no need for users to manually define privacy constraints at all.

4.2. Calculate Minimal Fragmentation

Given a relational database, there are many correct fragmentation schemes. We can quickly calculate a simple minimal fragmentation scheme by Theorems 1 and 2.
Theorem 3.
Let R ( a 1 , a 2 , a n ) be a relation schema, and E N ( R ) represent the entropy of it. E N ( a i ) is the entropy value of each attribute. F is a correct fragmentation and close to the optional minimal fragmentation schemes, and ⌈⌉ is the ceiling function, t h r e s h o l d is a parameter that allows users to adjust the strength of privacy protection, thus
# F = i = 1 n E N ( a i ) E N ( R ) × t h r e s h o l d .
Proof of Theorem 3.
We get correct fragmentation schemes F = { f 1 , f 2 , f p } . From Definition 2, we know
f 1 f 2 f p = { a 1 , a 2 , a n } ,
f i , f j F , i j : f i f j = .
According to Theorem 2,
E N ( f 1 ) + E N ( f 2 ) + E N ( f p ) E N ( a 1 ) + E N ( a 2 ) + E N ( a n )
E N ( i = 1 p E N ( f i ) ) i = 1 n E N ( a i ) .
We know from Section 4.1 that, when a fragmentation violates privacy constraints, its entropy must be greater than E N ( R ) × t h r e s h o l d . When F is a correct fragmentation, thus
E N ( f i ) < E N ( R ) × t h r e s h o l d .
From Equations (5) and (6), we can conclude that
# F = p = i = 1 n E N ( a i ) E N ( R ) × t h r e s h o l d .
 □
According to the above method, we can quickly calculate a smaller number of fragmentation, but not an optimal solution.

4.3. Minimum Entropy Fragmentation Algorithm

By using the entropy to quantify privacy, we can automatically discover the privacy constraints between attributes and the number of fragmentation. In this section, we achieve another goal, which is to minimize the amount of information disclosed in each fragment using the minimum entropy fragmentation algorithm.
From the definition of information entropy, we know that if the entropy of an attribute is x, then the amount of information it contains is 2 x . Thus, the information disclosed after fragmentation is:
I ( n ) = i = 1 n 2 E N ( f i )
E N ( f ( i ) ) represents the entropy value of fragmentation f ( i ) , and n represents the number of fragments. In order for us to turn this problem into: given a relation R ( a 1 , a 2 , a n ) , F = { f 1 , f 2 , f p } is a correct minimal fragmentation, this requires the following constraints:
f i , E N ( f i ) < E N ( R ) t h r e s h o l d
and make the I ( p ) as small as possible
I ( p ) = i = 1 p 2 E N ( f i ) .
This is the constrained minimum solution problem. To achieve the approximate optimal solution of disclosing the minimum amount of information, we employ a greedy algorithm, shown in Algorithm 2.
The minimum entropy fragmentation algorithm takes the table to be split as input, and the fragmentation result is saved in the array F S . Line 1 calculates the number of records and the number of attributes, marked as m and n, respectively. The function c a l E n t r o p y takes the attribute and the number of records as input, using Equations (3) and (4) to calculate the entropy of the attribute. Lines 2 to 4 calculate the entropy of a single attribute in Table A. In Line 5, we calculate the entropy of entire table. In Line 6, we use Theorem 3 with the function c a l M i n i m a l F r a g m e n t a t i o n to calculate the minimal number of fragments. In Line 7, all of the attributes are arranged in descending order. Lines 8 to 10 fill in the maximum attributes to the result array F S . Line 14 uses Equation (7) to calculate the current amount of information disclosure, while Lines 16 to 22 calculate the amount of information disclosure after adding the specified attribute to each fragment. On line 17, we use the function c a l S e t S u m E n t r o p y to calculate the entropy of the set F S and determine if there is a risk of privacy leak after adding the attribute A i . If there is a risk of privacy leak, we set the amount of information disclosure to the maximum value of the system; otherwise, we use the function c a l I n f o I n c r e m e n t to calculate the increment of information disclosure. On Line 23, the fragmentation that minimizes the amount of information disclosed is selected. Finally, the attributes are assigned to the target fragmentation. Thus, there is no need for users to specify privacy constraints at all, and an evaluation of the privacy level after fragmentation can be made.
Algorithm 2 Minimum Entropy Fragmentation Algorithm (TableA, FS)
Input: Input parameters Table A : the table to be fragmented
Output: Output FS : the result array of fragmentation
 1: [ m , n ] = s i z e ( T a b l e A )
 2: for each A i { A 1 , A n } do
 3:    A t t r i _ e n t r o p y = c a l E n t r o p y ( A i , m )
 4: end for
 5: T a b l e _ e n t r o p y = c a l E n t r o p y ( T a b l e A , m )
 6: s = c a l M i n i m a l F r a g m e n t a t i o n ( T a b l e _ e n t r o p y , A t t r i _ e n t r o p y )
 7: [ A t t r i S o r t , S i n d e x ] = S o r t B y D e s c e n d ( A t t r i _ e n t r o p y )
 8: for each i { 1 , s } do
 9:    F S [ i ] = A t t r i S o r t [ i ]
10: end for
11: A t t r i S o r t = A t t r i S o r t F S
12: for each A i A t t r i S o r t do
13:
14:   p r e I n f o r m a t i o n = i = 1 s 2 E N ( F S [ i ] )
15:
16:  for each j { 1 , . . s } do
17:   if ( c a l E n t r o p y ( A i , m ) + c a l S e t S u m E n t r o p y ( F S [ j ] , m ) ) > T a b l e _ e n t r o p y × t h r e s h o l d then
18:     I n f o r m a t i o n [ j ] = M a x _ N u m b e r
19:   else
20:     I n f o r m a t i o n [ j ] = c a l I n f o I n c r e m e n t ( c a l E n t r o p y ( A i + F S [ j ] , m ) , p r e I n f o r m a t i o n )
21:   end if
22:  end for
23:   t a r g e t = m i n i m a l ( I n f o r m a t i o n )
24:   F S [ t a r g e t ] = F S [ t a r g e t ] A i
25: end for

5. Experiments

Considering that there is no published data set for the problem defined in this paper, we tested the algorithm on the adult database of UCI datasets (http://archive.ics.uci.edu/ml/datasets/Adult). The UCI database is intended to be used for machine learning, presented by the University of California Irvine. Table 2 gives the detailed information of the test dataset. It has 14 attributes, which are age, workclass, fnlwgt (serial number), education, education_num (time of education), maritial_status, occupation, relationship, race, sex, capital_gain, capital_loss, hours_per_week, and native_country. In the following, we replace these attributes with the serial numbers 1–14.

5.1. Implementation and Usability Aspects

Our experiments were tested on an Intel(R) Core(TM) i5-4210U 1.7 GHz CPU (Intel Corporation, California, CA, USA) with 8 GB RAM. Entropy calculation and the minimum entropy fragmentation algorithm were run with Matlab 2014a (8.3.0.532, MathWorks, Massachusetts, MA, USA).
To break constraints, we could not use semantics to determine which attributes together would lead to privacy leak risk in the adult database. Instead, we propose that, if some attributes together can identify a record easily, then they have a privacy constraint. This is similar to a primary key and can completely identify a record. First, we calculated the original unfragmented adult database’s entropy to be 14.9893. From the previous definition, we let t h r e s h o l d = 0 . 8 , which means that when the entropy of the attribute set exceeds 14.9893 × 0.8 , it is considered to have privacy constraints. Next, we calculated the entropy of the set of attributes for groups of attributes. For these sets of attributes, we listed the sets whose entropy exceeds 14.9893 × 0.8 , which are the sets that have privacy constraints, as shown in Table 3. For example, the entropy of the first row attribute set (1, 2, 4, 7), corresponding to age, workclass, education and occupation is 12.1658, which may represent a privacy constraint. The other attribute sets in the table represent other privacy constraints that exist in the adult database. We subjected the adult database to Algorithm 2. The minimum number of fragments is 4, and the last fragmentation result was F 1 = { 3 } , F 2 = { 1 , 11 , 14 } , F 3 = { 2 , 4 , 5 , 7 , 12 } , and F 4 = { 6 , 8 , 9 , 10 , 13 } . From the final fragmentation results, all possible privacy constraints in Table 3 have been broken, thus we have completely broken these potential privacy constraints.
Concerning the lower information aspect, we know the original unfragmented adult database’s entropy is 14.9893. We also calculated the last entropy of each fragment F 1 to F 4 to be 14.1583, 7.2534, 7.6337, and 7.4301, respectively. Therefore, the entropy is reduced after fragmentation, and the risk of a privacy leak is significantly reduced. Since our minimum entropy fragmentation algorithm is a greedy algorithm, we have not yet obtained the optimal solution.

5.2. Performance Evaluation

In order to evaluate the minimum entropy fragmentation algorithm performance, we tested the time cost according to the number of samples and attributes. The adult database has 14 attributes and 32,561 records. We use the exhaustive method to calculate the minimum entropy fragmentation. In the experiment of the adult database, when there are only four attributes, it takes 17 seconds, but when the attribute is increased to 10, the time is increased to 1709 s. Thus, the exhaustive method takes time to grow exponentially and cannot be applied in reality. In order to observe the variation of our algorithm with the number of records, we divide the number of records into {1000, 2000, 4000, 8000, 16,000, 32,561} with a fixed number of attributes. In addition, in the case of fixed records, the attributes were divided into {4, 6, 8, 10, 12, 14}. Figure 2a shows the time cost when the adult database varies in the number of records, but the number of attributes is fixed at 14. The correlation coefficient between the number of records and the time cost was 0.9667, and thus a strong linear relationship between the number of records and the overhead time of the greedy algorithm was observed. Figure 2b shows the time cost when the number of attributes is varied, but the number of records is fixed at 32,561. We also calculated the correlation coefficient between the number of attributes and the time cost to be 0.9977.
In order to maintain the generalizability of our approach, we conducted experiments in the census-income database of the UCI database (http://archive.ics.uci.edu/ml/datasets/Census+Income), as depicted in Figure 3a,b. The census-income database has 199,523 records and 42 attributes. The correlation coefficients were calculated to be 0.9940 and 0.9806, respectively. Thus, the greedy fragmentation algorithm proposed in this paper is a polynomial time algorithm, which can quickly fragment the database with privacy protection.

6. Discussion

Relational databases have always been the preferred solution for storing data. However, with the development of the internet, there must be more computing resources to handle fast-growing data. Extensions to computing resources include vertical scaling and horizontal scaling. The general method of vertical scaling is to replace the CPU, memory, etc., but this method is costly and has limited scalability. Another method is to use a small set of computers for large-scale computing tasks. Since relational databases are not suitable for building on clusters, NoSQL (Not Only SQL) databases have emerged.
NoSQL databases are divided into four categories according to storage methods [32]: (1) key-value storage, (2) columnar storage, (3) document storage, and (4) graphic storage. In the NoSQL data storage model, both columnar storage and document storage can be understood as extensions to key-value storage. These NoSQL databases are based on distributed storage, and the data is horizontally sharded and distributed to multiple nodes. The two major sharding strategies are order-preserving partitioning (OPP) and random partitioning (RP) [33]. OPP can perform range queries, but it may cause load-balancing problems. The current sharding method mainly considers load balancing and range query, regardless of privacy issues. We believe that our proposed entropy method can be used to protect privacy in NoSQL key-value storage databases because the information stored by each node can be quantified as EN( n o d e 1 ), EN( n o d e 2 ), ...EN( n o d e n ). However, from the current point of view, it is inefficient to calculate the entropy value in a NoSQL database. When a data record is generated, we need to recalculate which node is placed to minimize the entropy, so we need to fetch the data of each node and parse it to calculate the entropy, which is a time-consuming task. There may be some techniques such as delayed record write, or caching each node feature information for entropy calculation to reduce the time overhead. However, these will always reduce the writing efficiency of the NoSQL database. For most NoSQL databases, it is necessary to support efficient writing operations, and our proposed entropy calculation method is only suitable for mass reading applications. To extend our method to NoSQL databases, we need to propose a new entropy calculation method. In the case of caching the key feature of each node, we can estimate the entropy value of the node after adding new data. This will be our next step in future work.

7. Conclusions

In this paper, we introduced information entropy as a powerful tool to quantify privacy; thus, we can automatically discover potential privacy constraints between attributes without the need for users to manually define such constraints. Based on this, we provided a greedy method of vertically fragmenting the data with the information entropy, which we called the minimum entropy fragmentation algorithm. With this approach, we can evaluate how much private information is contained in different vertical fragments. Our method is currently not applicable to NoSQL databases, but it is a feasible privacy protection scheme that enables us to optimize the efficiency of entropy calculation.

Author Contributions

T.H. contributed the design of the ideas, the analysis of results, and the writing of the paper. S.M., Z.W. and J.R. proofread the paper.

Funding

This research is supported by the National Natural Science Foundation of China (Grant No. 61303191 and No. 61402508) and the National High Technology Research and Development Program of China (Grant No. 2015AA016010).

Acknowledgments

We would like to acknowledge our families, friends, and colleagues for their support, suggestions, and reviews while conducting this study. We are also thankful to them for the successful completion of this part of the project.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Mowbray, M.; Pearson, S. A client-based privacy manager for cloud computing. In Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and MiddlewaRE, Dublin, Ireland, 16–19 June 2009; ACM: New York, NY, USA, 2009; p. 5. [Google Scholar]
  2. Gentry, C. A Fully Homomorphic Encryption Scheme; Stanford University: Stanford, CA, USA, 2009. [Google Scholar]
  3. Curtmola, R.; Garay, J.; Kamara, S.; Ostrovsky, R. Searchable symmetric encryption: Improved definitions and efficient constructions. J. Comput. Secur. 2011, 19, 895–934. [Google Scholar] [CrossRef] [Green Version]
  4. Kamara, S.; Papamanthou, C.; Roeder, T. Dynamic searchable symmetric encryption. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, USA, 16–18 October 2012; ACM: New York, NY, USA, 2012; pp. 965–976. [Google Scholar]
  5. Samarati, P.; Sweeney, L. Protecting Privacy When Disclosing Information: K-Anonymity and Its Enforcement Through Generalization and Suppression; Technical Report; SRI International: Menlo Park, CA, USA, 1998. [Google Scholar]
  6. Sweeney, L. k-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 2002, 10, 557–570. [Google Scholar] [CrossRef]
  7. Machanavajjhala, A.; Gehrke, J. l-Diversity: Privacy Beyond k-Anonymity; IEEE: New York, NY, USA, 2006; p. 24. [Google Scholar]
  8. Li, N.; Li, T.; Venkatasubramanian, S. t-closeness: Privacy beyond k-anonymity and l-diversity. In Proceedings of the IEEE 23rd International Conference on Data Engineering (ICDE 2007), Istanbul, Turkey, 15–20 April 2007; pp. 106–115. [Google Scholar]
  9. Hacigümüş, H.; Iyer, B.; Li, C.; Mehrotra, S. Executing SQL over encrypted data in the database-service-provider model. In Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, WI, USA, 3–6 June 2002; ACM: New York, NY, USA, 2012; pp. 216–227. [Google Scholar]
  10. Hore, B.; Mehrotra, S.; Tsudik, G. A privacy-preserving index for range queries. In Proceedings of the Thirtieth International Conference on Very Large Data Bases, Toronto, ON, Canada, 31 August–3 September 2004; Volume 30, pp. 720–731. [Google Scholar]
  11. Wang, Z.F.; Dai, J.; Wang, W.; Shi, B.L. Fast query over encrypted character data in database. In Proceedings of the International Conference on Computational and Information Science, Shanghai, China, 16–18 December 2004; Springer: Berlin, Germany, 2004; pp. 1027–1033. [Google Scholar]
  12. Damiani, E.; Di Vimercati, S.D.C.; Foresti, S.; Samarati, P.; Viviani, M. Measuring inference exposure in outsourced encrypted databases. In Quality of Protection; Springer: Berlin, Germany, 2006; pp. 185–195. [Google Scholar]
  13. Boldyreva, A.; Chenette, N.; Lee, Y.; O’neill, A. Order-preserving symmetric encryption. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, 26–30 April 2009; Springer: Berlin, Germany, 2009; pp. 224–241. [Google Scholar]
  14. Ciriani, V.; Di Vimercati, S.D.C.; Foresti, S.; Jajodia, S.; Paraboschi, S.; Samarati, P. Fragmentation and encryption to enforce privacy in data storage. In Proceedings of the European sYmposium on Research in Computer Security, Dresden, Germany, 24–26 September 2007; Springer: Berlin, Germany, 2007; pp. 171–186. [Google Scholar]
  15. Di Vimercati, S.D.C.; Foresti, S.; Jajodia, S.; Paraboschi, S.; Samarati, P. Encryption policies for regulating access to outsourced data. ACM Trans. Database Syst. (TODS) 2010, 35, 12. [Google Scholar] [CrossRef]
  16. Di Vimercati, S.D.C.; Erbacher, R.F.; Foresti, S.; Jajodia, S.; Livraga, G.; Samarati, P. Encryption and fragmentation for data confidentiality in the cloud. In Foundations of Security Analysis and Design VII; Springer: Berlin, Germany, 2014; pp. 212–243. [Google Scholar]
  17. Di Vimercati, S.D.C.; Foresti, S.; Samarati, P. Selective and fine-grained access to data in the cloud. In Secure Cloud Computing; Springer: Berlin, Germany, 2014; pp. 123–148. [Google Scholar]
  18. Di Vimercati, S.D.C.; Foresti, S.; Livraga, G.; Samarati, P. Selective and private access to outsourced data centers. In Handbook on Data Centers; Springer: Berlin, Germany, 2015; pp. 997–1027. [Google Scholar]
  19. Di Vimercati, S.D.C.; Foresti, S.; Livraga, G.; Samarati, P. Practical techniques building on encryption for protecting and managing data in the cloud. In The New Codebreakers; Springer: Berlin, Germany, 2016; pp. 205–239. [Google Scholar]
  20. Di Vimercati, S.D.C.; Foresti, S.; Livraga, G.; Paraboschi, S.; Samarati, P. Confidentiality Protection in Large Databases. In A Comprehensive Guide through the Italian Database Research Over the Last 25 Years; Springer: Berlin, Germany, 2018; pp. 457–472. [Google Scholar]
  21. Xiong, L.; Goryczka, S.; Sunderam, V. Adaptive, secure, and scalable distributed data outsourcing: A vision paper. In Proceedings of the 2011 Workshop on Dynamic Distributed Data-Intensive Applications, Programming Abstractions, and Systems, San Jose, CA, USA, 8 June 2011; ACM: New York, NY, USA, 2011; pp. 1–6. [Google Scholar]
  22. Biskup, J.; Preuß, M.; Wiese, L. On the inference-proofness of database fragmentation satisfying confidentiality constraints. In Proceedings of the International Conference on Information Security, Xi’an, China, 26–29 October 2011; Springer: Berlin, Germany, 2011; pp. 246–261. [Google Scholar]
  23. Ganapathy, V.; Thomas, D.; Feder, T.; Garcia-Molina, H.; Motwani, R. Distributing data for secure database services. In Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society, Uppsala, Sweden, 21–24 March 2011; ACM: New York, NY, USA, 2011; p. 8. [Google Scholar]
  24. Bkakria, A.; Cuppens, F.; Cuppens-Boulahia, N.; Fernandez, J.M.; Gross-Amblard, D. Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption. JoWUA 2013, 4, 39–62. [Google Scholar]
  25. Shannon, C.E. A mathematical theory of communication. ACM SIGMOBILE Mob. Comput. Commun. Rev. 2001, 5, 3–55. [Google Scholar] [CrossRef]
  26. Diaz, C.; Seys, S.; Claessens, J.; Preneel, B. Towards measuring anonymity. In Proceedings of the International Workshop on Privacy Enhancing Technologies, San Francisco, CA, USA, 14–15 April 2002; Springer: Berlin, Germany, 2002; pp. 54–68. [Google Scholar]
  27. Serjantov, A.; Danezis, G. Towards an information theoretic metric for anonymity. In Proceedings of the International Workshop on Privacy Enhancing Technologies, San Francisco, CA, USA, 14–15 April 2002; Springer: Berlin, Germany, 2002; pp. 41–53. [Google Scholar]
  28. Aggarwal, G.; Bawa, M.; Ganesan, P.; Garcia-Molina, H.; Kenthapadi, K.; Motwani, R.; Srivastava, U.; Thomas, D.; Xu, Y. Two can keep a secret: A distributed architecture for secure database services. In Proceedings of the Second Biennial Conference on Innovative Data Systems Research (CIDR 2005), Asilomar, CA, USA, 4–7 January 2005. [Google Scholar]
  29. Ciriani, V.; De Capitani di Vimercati, S.; Foresti, S.; Livraga, G.; Samarati, P. An OBDD approach to enforce confidentiality and visibility constraints in data publishing. J. Comput. Secur. 2012, 20, 463–508. [Google Scholar] [CrossRef]
  30. Deming, S.N. Multiple-criteria optimization. J. Chromatogr. A 1991, 550, 15–25. [Google Scholar] [CrossRef]
  31. Peng, C.G.; Ding, H.F.; Zhu, Y.J.; Tian, Y.L. Information entropy models and privacy metrics methods for privacy protection. J. Softw. 2016, 27, 1891–1903. [Google Scholar]
  32. Cattell, R. Scalable SQL and NoSQL data stores. ACM Sigmod Rec. 2011, 39, 12–27. [Google Scholar] [CrossRef]
  33. Okman, L.; Gal-Oz, N.; Gonen, Y.; Gudes, E.; Abramov, J. Security issues in nosql databases. In Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Changsha, China, 16–18 November 2011; pp. 541–547. [Google Scholar]
Figure 1. Storage model.
Figure 1. Storage model.
Symmetry 10 00637 g001
Figure 2. Time cost for experiments on the adult database with respect to (a) changing the number of records, and (b) changing the number of attributes.
Figure 2. Time cost for experiments on the adult database with respect to (a) changing the number of records, and (b) changing the number of attributes.
Symmetry 10 00637 g002
Figure 3. Time cost in census database with respect to (a) changing the number of records, and (b) changing the number of attributes.
Figure 3. Time cost in census database with respect to (a) changing the number of records, and (b) changing the number of attributes.
Symmetry 10 00637 g003
Table 1. An example of a patient’s information sheet and the associated privacy constraints.
Table 1. An example of a patient’s information sheet and the associated privacy constraints.
SSNNameDoBZip CodeDiseasePhysician
123-56-1234Alice08/0398112FluM.White
234-56-7890Bob10/0794778AsthmaD.Warren
345-67-8901David02/1294139GastritisM.White
456-78-9012Jery08/0394139FluK.Jsery
567-89-0123Semy03/0494141AnginaD.Warren
678-90-1234Fred12/0194142DiabetesM.Kity
c 0 = {SSN, name}, c 1 = {SSN, DoB}, c 2 = {SSN, zip code}, c 3 = {SSN, disease}, c 5 = {SSN, physician}, c 6 = {name, DoB}, c 7 = {name, zip code}, c 8 = {name, disease}, c 9 = {name, physician}, c 10 = {DoB, zip code, disease}, c 11 = {DoB, zip code, physician}.
Table 2. Detailed information of adult datasets.
Table 2. Detailed information of adult datasets.
DatasetNumber of SamplesDimensions
Adult32,56114
Table 3. Calculate constraints.
Table 3. Calculate constraints.
AttributesEntropyAttributesEntropy
314.15831, 4, 6, 1312.2393
1, 2, 4, 712.16581, 4, 7, 812.6782
1, 2, 4, 1312.20121, 4, 7, 1313.2738
1, 2, 5, 712.16581, 4, 8, 1312.5190
1, 2, 5, 1312.20121, 5, 6, 712.3872
1, 2, 7, 1312.46231, 5, 6, 1312.2393
1, 4, 6, 712.38721, 5, 7, 812.6782
1, 5, 7, 1313.27381, 5, 8, 1312.5190
1, 6, 7, 1312.68071, 7, 8, 1312.9189
1, 7, 9, 1312.25231, 7, 10, 1312.2812
1, 7, 11,1312.09081, 7, 13, 1412.1851

Share and Cite

MDPI and ACS Style

Hong, T.; Mei, S.; Wang, Z.; Ren, J. A Novel Vertical Fragmentation Method for Privacy Protection Based on Entropy Minimization in a Relational Database. Symmetry 2018, 10, 637. https://doi.org/10.3390/sym10110637

AMA Style

Hong T, Mei S, Wang Z, Ren J. A Novel Vertical Fragmentation Method for Privacy Protection Based on Entropy Minimization in a Relational Database. Symmetry. 2018; 10(11):637. https://doi.org/10.3390/sym10110637

Chicago/Turabian Style

Hong, Tie, SongZhu Mei, ZhiYing Wang, and JiangChun Ren. 2018. "A Novel Vertical Fragmentation Method for Privacy Protection Based on Entropy Minimization in a Relational Database" Symmetry 10, no. 11: 637. https://doi.org/10.3390/sym10110637

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop