• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö > Á¤º¸°úÇÐȸ ³í¹®Áö A : ½Ã½ºÅÛ ¹× ÀÌ·Ð

Á¤º¸°úÇÐȸ ³í¹®Áö A : ½Ã½ºÅÛ ¹× ÀÌ·Ð

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) µ¥ÀÌÅͺ£À̽º ¾Æ¿ô¼Ò½ÌÀ» À§ÇÑ À§Ä¡ µ¥ÀÌÅÍ º¸È£¸¦ Áö¿øÇÏ´Â °ø°£ ÁÂÇ¥ º¯È¯ ±â¹ý
¿µ¹®Á¦¸ñ(English Title) Spatial Transformation Schemes for Location Data Privacy in Outsourced Databases
ÀúÀÚ(Author) À± ¹Î   ±èÇüÀÏ   ÀåÀç¿ì   Min Yoon   Hyeongil Kim   Jaewoo Chang  
¿ø¹®¼ö·Ïó(Citation) VOL 39 NO. 06 PP. 0353 ~ 0365 (2012. 12)
Çѱ۳»¿ë
(Korean Abstract)
Ãֱ٠Ŭ¶ó¿ìµå ÄÄÇ»ÆÃÀÇ ¹ßÀü¿¡ µû¶ó °ø°£ µ¥ÀÌÅͺ£À̽ºÀÇ ¾Æ¿ô¼Ò½Ì(outsourcing)¿¡ ´ëÇÑ °ü½ÉÀÌ ±ÞÁõÇÏ°í ÀÖ´Ù. µû¶ó¼­ µ¥ÀÌÅͺ£À̽º ¾Æ¿ô¼Ò½Ì¿¡¼­ÀÇ À§Ä¡ µ¥ÀÌÅÍ º¸È£¸¦ À§ÇÑ °ø°£ ÁÂÇ¥ º¯È¯ ±â¹ýÀÌ È°¹ßÈ÷ ¿¬±¸µÇ¾î ¿Ô´Ù. ±×·¯³ª ±âÁ¸ °ø°£ ÁÂÇ¥ º¯È¯ ±â¹ýµéÀº ±ÙÁ¢(ÀϹÝ) °ø°Ý¿¡ Ãë¾àÇϱ⠶§¹®¿¡, µ¥ÀÌÅͺ£À̽º ¾Æ¿ô¼Ò½ÌÀ» ÅëÇØ ¼­ºñ½º¸¦ Á¦°ø¹Þ´Â »ç¿ëÀÚÀÇ »ç»ýÈ°À» º¸È£ÇÏÁö ¸øÇÑ´Ù´Â ¹®Á¦¸¦ º¸ÀδÙ. µû¶ó¼­ »ç¿ëÀÚÀÇ ¾ÈÀüÇÑ ¼­ºñ½º »ç¿ëÀ» À§ÇÑ °ø°£ ÁÂÇ¥ º¯È¯ ±â¹ýÀÌ ¿ä±¸µÈ´Ù. À̸¦ À§ÇØ, º» ³í¹®¿¡¼­´Â ¼±´ëĪ À̵¿ ±â¹Ý °ø°£ ÁÂÇ¥ º¯È¯ ±â¹ýÀ» Á¦¾ÈÇÑ´Ù. Á¦¾ÈÇÏ´Â ±â¹ýÀº À§Ä¡ µ¥ÀÌÅÍ º¸È£¸¦ À§ÇØ µ¥ÀÌÅÍ ºÐÆ÷º¯È¯ ¹× ¿¡·¯ »ðÀÔÀ» ¼öÇàÇÏ°í ±ÙÁ¢ °ø°ÝÀÇ È¿À²ÀûÀÎ ¹æÁö¸¦ À§ÇØ ¼±´ëĪ À̵¿À» ÀÌ¿ëÇÑ °ø°£ ÁÂÇ¥ º¯È¯À» ¼öÇàÇÑ´Ù. ¸¶Áö¸·À¸·Î, ¼º´ÉÆò°¡¸¦ ÅëÇØ Á¦¾ÈÇÏ´Â ±â¹ýÀÌ ±ÙÁ¢ °ø°Ý¿¡ÀÇ ³ëÃâ È®·üÀ» Å©°Ô °¨¼Ò½ÃÅ°¸é¼­, ºü¸£°Ô °ø°£ ÁÂÇ¥ º¯È¯À» ¼öÇàÇÔÀ» °ËÁõÇÑ´Ù.

¿µ¹®³»¿ë
(English Abstract)
The study on spatial database outsourcing has been attracted with the development of cloud computing. Therefore, researches for protecting location data privacy in outsourced database have been actively studied. However, since the existing spatial transformation schemes are weak to proximity attack, they can not protect the privacy of users who enjoy location-based services from the outsourced database. Therefore, a transformation scheme for providing a safe service to users is required. So, we, in this paper, propose a line symmetric transformation (LST) based transformation scheme. The proposed scheme performs data distribution transformation and error-injection and also performs a LST based transformation for preventing proximity attack efficiently. Finally, we show from performance analysis that the proposed scheme greatly reduces the successful rate of the proximity attack while performing the spatial transformation in a short time.

Å°¿öµå(Keyword) µ¥ÀÌÅͺ£À̽º ¾Æ¿ô¼Ò½Ì   À§Ä¡ µ¥ÀÌÅÍ º¸È£   °ø°£ ÁÂÇ¥ º¯È¯ ±â¹ý   Database outsourcing   Location data protection   Spatial transformation scheme  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå