Distributed Memetic Algorithm for Outsourced Database Fragmentation
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ge, Yong-Feng | - |
dc.contributor.author | Yu, Wei-Jie | - |
dc.contributor.author | Cao, Jinli | - |
dc.contributor.author | Wang, Hua | - |
dc.contributor.author | Zhan, Zhi-Hui | - |
dc.contributor.author | Zhang, Yanchun | - |
dc.contributor.author | ZHANG, Jun | - |
dc.date.accessioned | 2023-12-11T08:00:19Z | - |
dc.date.available | 2023-12-11T08:00:19Z | - |
dc.date.issued | 2021-10 | - |
dc.identifier.issn | 2168-2267 | - |
dc.identifier.issn | 2168-2275 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/116250 | - |
dc.description.abstract | Data privacy and utility are two essential requirements in outsourced data storage. Traditional techniques for sensitive data protection, such as data encryption, affect the efficiency of data query and evaluation. By splitting attributes of sensitive associations, database fragmentation techniques can help protect data privacy and improve data utility. In this article, a distributed memetic algorithm (DMA) is proposed for enhancing database privacy and utility. A balanced best random distributed framework is designed to achieve high optimization efficiency. In order to enhance global search, a dynamic grouping recombination operator is proposed to aggregate and utilize evolutionary elements; two mutation operators, namely, merge and split, are designed to help arrange and create evolutionary elements; a two-dimension selection approach is designed based on the priority of privacy and utility. Furthermore, a splicing-driven local search strategy is embedded to introduce rare utility elements without violating constraints. Extensive experiments are carried out to verify the performance of the proposed DMA. Furthermore, the effectiveness of the proposed distributed framework and novel operators is verified. © 2013 IEEE. | - |
dc.format.extent | 14 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | IEEE Advancing Technology for Humanity | - |
dc.title | Distributed Memetic Algorithm for Outsourced Database Fragmentation | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1109/TCYB.2020.3027962 | - |
dc.identifier.scopusid | 2-s2.0-85096857120 | - |
dc.identifier.wosid | 000706832000008 | - |
dc.identifier.bibliographicCitation | IEEE Transactions on Cybernetics, v.51, no.10, pp 4808 - 4821 | - |
dc.citation.title | IEEE Transactions on Cybernetics | - |
dc.citation.volume | 51 | - |
dc.citation.number | 10 | - |
dc.citation.startPage | 4808 | - |
dc.citation.endPage | 4821 | - |
dc.type.docType | 정기학술지(Article(Perspective Article포함)) | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Automation & Control Systems | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Automation & Control Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Artificial Intelligence | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Cybernetics | - |
dc.subject.keywordPlus | GENETIC ALGORITHM | - |
dc.subject.keywordPlus | ENCRYPTION | - |
dc.subject.keywordPlus | MANAGEMENT | - |
dc.subject.keywordPlus | ALLOCATION | - |
dc.subject.keywordAuthor | Database fragmentation | - |
dc.subject.keywordAuthor | database privacy and utility | - |
dc.subject.keywordAuthor | distributed memetic algorithm (DMA) | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/9248624?arnumber=9248624&SID=EBSCO:edseee | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.