Username   Password       Forgot your password?  Forgot your username? 


XML Privacy Preserving Model based on Dynamic Context

Volume 14, Number 12, December 2018, pp. 3206-3219
DOI: 10.23940/ijpe.18.12.p30.32063219

Meijuan Wanga,b, Song Huangb,*, Changyou Zhengb, and Hui Lib

aCollege of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210016, China
bCommand & Control Engineering College, Army Engineering University of PLA, Nanjing, 210007, China

(Submitted on September 14, 2018; Revised on October 13, 2018; Accepted on November 15, 2018)


The development of cloud computing has brought about rapid changes in the data application environment. The contradiction between the availability of data fusion and privacy protection is increasing. Traditional information security focuses on hiding attributes, while big data privacy protection pays more attention to access control and data using methods. As a semi-structured representation model, XML data is an ideal carrier for heterogeneous data exchange and unstructured data storage. This paper deeply studies several problems involved in user’s individual access process for XML data privacy preserving, and proposes prior knowledge as dynamic context. Based on the innovative privacy bipartite graph and the XML document semantic encoding, we propose the XML data privacy preserving model DCPPM and the algorithm KCQ to resist reasoning attack. The scheme to preventive response of the real-time inference attack in the actual operation process is realized. Finally, the example verification and experimental data show that the proposed model can effectively protect the safe use of private data and sensitive data in real time, which has certain theoretical and practical significance.


References: 22

                    1. S. Wang, H. Wang, X. P. Qin, et al., “Architecting Big Data: Challenges, Studies, and Forecasts,” Chinese Journal of Computers, Vol. 3, No. 10, pp. 1741-1752, 2011
                    2. X. F. Meng, “Overview of Big Data Management,” Mechanical Industry Press , pp. 84-110, 2017
                    3. G. D. Abowd, A. K. Dey, P. J. Brown, et al., “Towards a Better Understanding of Context and Context-Awareness,” International Symposium on Handheld & Ubiquitous Computing, Vol. 1707, pp. 304-307, 1999
                    4. R. J. Hulsebosch, A. H. Salden, et al., “Context Sensitive Access Control,” in Proceedings of the SACMAT, pp. 111-118, Stockholm, Sweden, 2005
                    5. Z. K. Zhang, J. G. Xiao, and X. N. Kong, “XML-based Context-Constraint Access Control Policy Management,” Acta Scientiarum Naturalium Universitatis Pekinensis, Vol. 46, No. 4, pp. 539-546, 2010
                    6. S. S. Emami and S. Zokaei, “A Context-Sensitive Dynamic Role-based Access Control Model for Pervasive Computing Environments,” The ISC Intl Journal of Information Security, Vol. 2, No. 1, pp. 47-66, 2010
                    7. J. Zhang and F. Xiong, “Survey on Technologies of Internet Privacy Preservation,” Application Research of Computers, Vol. 22, No. 7, pp. 9-411, 2005
                    8. S. A. Mcilraith, T. C. Son, and H. L. Zeng, “Semantic Web Services,” IEEE Intelligent Systems, Vol. 16, No. 2, pp. 46-53, 2001
                    9. A. Tumer, A. Dogac, and I. H. Toroslu. “A Semantic based Privacy Framework for Web Services,” in Proceedings of WWW03 Workshop on E-Services and the Semantic Web, pp. 356-362, 2003
                    10. T. H. Hinke, H. S. Delugach, and P.W. Randall, “Protecting Databases from Inference Attacks,” Computers & Security, Vol. 16, No. 8, pp. 687-708, 1997
                    11. K. Hashimoto, H. Kawai, Y. Ishihara, et al., “Decidability of the Security Against Inference Attacks Using a Functional Dependency on XML Databases,” IEICE Transactions on Information & Systems, Vol. 95, No. D, pp. 1365-1374. 2012
                    12. Y. Xu, J. Ma, Q. F. He, et al., “The Inference Control of Functional Dependency based on Inference Channel,” Computer Simulation, Vol. 25, No. 1, pp. 88-91, 2008
                    13. Z. J. Zhang, J. S. Dai, and J. M Xiao, “Approach to Inference Disclosure Detection in Secure Database,” Journal of Jilin University (Information Science Edition), Vol. 23, No. 3, pp. 294-298, 2005
                    14. Z. Xu, G. L. Chen, and J. H. Li, “Inference Control of XML based on Inference Tree,” Communications Technology, Vol. 48, No. 2, pp. 208-213, 2015
                    15. Z. Li, “Research on Database Reasoning Control Technology,” Huazhong University of Science and Technology, 2006
                    16. M. J. Wang, J. Wang, L. H. Guo, et al., “Inverted XML Access Control Model based on Ontology Semantic Dependency,” Computers, Materials & Continua, Vol. 55, No. 3, pp. 465-482, 2018
                    17. C. Zhang, J. F. Naughton, D. J. DeWitt, et al., “On Supporting Containment Queries in Relational Database Management Systems,” in Proceedings of the 27th ACM SIGMOD, pp. 1-12, Santa Barbara, 2001
                    18. S. Tatarinov, D. Viglas, and K. J. Beyer, et al., “Storing and Query in Ordered XML Using a Relational Database System,” in Proceedings of the IEEE Computer Society ACM SIGMOD 2002, pp. 204-215, Los Alamitos, CA, 2002
                    19. X. Wu, M. Lee, and W. Hsu, “A Prime Number Labeling Scheme for Dynamic Ordered XML Trees,” in Proceedings of the IEEE Computer Society 20th International Conference on Data Engineering (ICDE 2004), pp. 66-78, Los Alamitos, CA, 2004
                    20. L. H. Guo, J. Wang, and H. Du, “An XML Encoding Scheme based on Concentric Circular Cutting,” Computer Engineering, Vol. 39, No. 6, pp. 52-55, 2013
                    21. Niagara, “NIAGARA Experimental Data [EB/OL],” (
                    22. R. Indrajit, T. V. S. Srinath, K. Ann, et al., “Airavat: Security and Privacy for MapReduce,” Usenix Symposium on Networked Systems Design & Implementation, pp. 297-312, 2009


                                      Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

                                      This site uses encryption for transmitting your passwords.