DocumentCode
526523
Title
Trust management in privacy — Preserving information system
Author
Peng, Kun ; Bao, Feng
Author_Institution
Inst. for Infocomm Res., Singapore, Singapore
Volume
7
fYear
2010
fDate
9-11 July 2010
Firstpage
1
Lastpage
4
Abstract
In many information management applications, sensitive information must be stored as a record and be retrieved when necessary. When the record is stored in a distributed way in multiple databases and shared by multiple users with different trust levels and accessing privileges, the trust management model is called M-to-M model. In this model, on one hand the record is stored in a distributed way; one the other hand every user obtains a different version of the record in their retrieving operations according to their different trust levels and access privileges. A scheme is proposed in this paper to specify M-to-M trust management. The new scheme not only realizes privacy-preserving information storage and sharing in a multi-level-trust environment, but also achieves robustness through information redundancy. The new technique is quite simple and does not need any cryptographic operation like encryption, digital signature or hash function, so its security is unconditional and does not depend on any computational assumption.
Keywords
cryptography; data privacy; distributed databases; information retrieval; records management; M-to-M model; M-to-M trust management; cryptography; digital signature; encryption; hash function; information management application; information redundancy; information retrieval; information storage; multilevel trust environment; privacy preserving information system; Computational modeling; Cryptography; Information systems;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on
Conference_Location
Chengdu
Print_ISBN
978-1-4244-5537-9
Type
conf
DOI
10.1109/ICCSIT.2010.5564459
Filename
5564459
Link To Document