Detecting privacy violations in sensitive XML databases

  • Authors:
  • Stefan Böttcher;Rita Steinmetz

  • Affiliations:
  • Computer Science, University of Paderborn, Paderborn, Germany;Computer Science, University of Paderborn, Paderborn, Germany

  • Venue:
  • SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Privacy violations and the exposition of sensitive data to a third party may seriously damage the business of a company. Therefore, it is crucial for the company to identify that set of users that may have exposed the sensitive data. To identify that set of users is a problem, when multiple users must have ac cess rights that allow them to access the exposed sensitive data. Our solution to the problem is based on an analysis of the users’ XPath queries. Within a two-step approach, we compare submitted queries with the exposed data to iden tify suspicious queries.