To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

Negative database

From Wikipedia, the free encyclopedia

In database security, a negative database is a database that saves attributes that cannot be associated with a certain entry.[1][2]

A negative database is a kind of database that contains huge amount of data consisting of simulating data. When anyone tries to get access to such databases both the actual and the negative data sets will be retrieved even if they steal the entire database. For example, instead of storing just the personal details you store personal details that members don't have.[3][4]

Negative databases can avoid inappropriate queries and inferences. They also support allowable operations.[5] Under this scenario, it is desirable that the database support only the allowable queries while protecting the privacy of individual records, say from inspection by an insider.

Collection of negative data has been referred to as "negative sousveillance":

"Negative databases (Esponda, 2006), is the keeping records which if stolen do not reveal the identity of individuals. Negative databases achieve this by storing the complement of the set of what is being tracked. Essentially the database shows what isn’t of concern. Extending his approach the negative intelligence gatherer would seek to understand what websites, infrastructure systems, environmental sensors or documents have become unavailable. The negative sousveillance concept then is to record, track, or infer what isn’t there."

— Reynolds, C. (2011). Negative sousveillance., in Proc. IACAP2011, pp. 306–308

[6]

YouTube Encyclopedic

  • 1/3
    Views:
    3 088
    728
    667
  • Exercises on distributed database
  • Mod-01 Lec-08 Lecture-08 Biometrics
  • Mod-01 Lec-11 Lecture-11 Biometrics

Transcription

References

  1. ^ "A Neighborhood of Infinity: Negative Databases".
  2. ^ "The non-denial of the non-self". The Economist. 31 August 2006.
  3. ^ Esponda, F., Ackley, E. S., Forrest, S., & Helman, P. (2004). Online negative databases. In Artificial Immune Systems (pp. 175-188). Springer Berlin Heidelberg.
  4. ^ Anup Patel, Niveeta Sharma & Magdalini Eirinaki (2011), Negative Database for Data Security, CoRR abs/1105.0049.
  5. ^ http://negdb.adaptive.cs.unm.edu/
  6. ^ Reynolds, C. (2011). Negative sousveillance., in Proc. IACAP2011, pp. 306–308


This page was last edited on 30 August 2022, at 00:35
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.