Pre-processes the data items by adding dummy keywords

Assignment Help Basic Computer Science
Reference no: EM13233710

Please read PDF file to understand complete assignment

Remove this leakage is as follows: the data owner pre-processes the data items by adding dummy keywords so that each keyword matches the same number of data items (some being real matches and some possibly being dummy matches). This approach increases the size of the database and we want to investigate algorithms that minimize the size of the resulting database.

Problem Statement: Let W denote a set of keywords.
An encrypted database is a matrix with n rows and 2 columns, where the n rows represent n data items, and the two columns represent a keyword header and a payload. We denote as w1 , . . . , wn ∈ W the (not necessarily different) keywords
in the first column.

A fixed answer length encrypted database is an encrypted database with n rows and m ≥ 2 columns, where the n rows represent n data items, and the m columns represent a real keyword header, m - 2 dummy keyword headers and a payload, satisfying the following property. Let rw1 , . . . , rwn ∈ W denote the (not necessarily different) real keywords in the first column. For j = 2, . . . , m - 1, let dw1j , . . . , dwnj ∈ W denote the (dummy) keywords in the next m - 2 keyword header columns. Then, for each keyword w ∈ W , the number of occurrences of w, denoted as occ(w), in the first m - 1 columns is
either 0 or a fixed positive integer k.

main goal is to transform an encrypted database into a fixed answer length while minimizing the number of dummy keyword headers. To do that, we can choose dummy keywords dw1j , . . . , dwnj from the set {rw1 , . . . , rwn , ⊥} so that occ(rw1 ) = • • • = occ(rwn ) = k, for some positive integer k, and the number m - 2 is minimized. Note that a dummy keyword can be either a real keyword or a meaningless symbol ⊥.

Assignment: Complete as many as possible among tasks (1)-(3).
1. What is the smallest possible value for k (as a function of occ(rw1 ), . . . , occ(rwn ))?

2. Let t denote the number m - 2 of dummy keyword headers. Can you provide an upper bound for t (as a function of
occ(rw1 ), . . . , occ(rwn ))? Can you provide a lower bound for t (as a function of occ(rw1 ), . . . , occ(rwn ))?

3. Can you define algorithm(s) to choose dummy keywords dw1j , . . . , dwnj , for j = 2, . . . , m - 1, from the set
{rw1 , . . . , rwn , ⊥} so to transform an encrypted database into a fixed answer length one and at the same time minimize
t? 

Reference no: EM13233710

Questions Cloud

State the condensed electron configurations : Write the condensed electron configurations using the noble gas convention for each of the ions in Kl, BaO, Rb2O, and AlCl3. Which of these ions are isoelectronic with Ar
Analyze and evaluate your syndicates development : What would you do differently, given your experience and this analysis, to enhance the performance of the group and the satisfaction of its members?
Calculate the marginal tax rate and average tax rate : 1.)Calculate the marginal tax rate (MTR) and average tax rate (ATR) for a person earning $15,000 and one earning $35,000. 2.)Is this tax system progressive, regressive, or proportional Describe fully 3.)Is it ever possible for the MTR = ATR When
State the element symbol and charge : Write the element symbol and charge. How many unpaired electrons are there in the ground state of this ion
Pre-processes the data items by adding dummy keywords : The data owner pre-processes the data items by adding dummy keywords so that each keyword matches the same number of data items
What is the density of the cube''s material : You observe that a solid cube of some material floats on the surface of an oil puddle at a service station with 68.5% of its volume submerged
Explain and identify the atom with electron configuration : Identify the atom whose electron configuration is [Ar]3d74s2. Write the one or two letter symbol for the element. How many unpaired electrons are there in the ground state of this atom
State the type of business : State the type of business you are managing (it can be any business you choose). Give two examples of controls that you would implement in the business and how they could facilitate goal attainment.
Evaluate us economy in terms of each of the six determinants : Write a short essay evaluating the U.S. economy in terms of each of the six determinants of average labor productivity discussed in the text. Are there any areas in which the United States is exceptionally strong, relative to other countries

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Draw the logic diagram for a circuit that resolves priority

Q:  "Draw the Logic diagram for a circuit that resolves priority among eight active-low inputs, 10_L-17_L, where 10_L has the highest priority.

  Actions-hard disk crash and all data backed up are lost

You come to work on a Monday morning and find that the office computer is not working. The system manager informs everyone that the computer's hard disk crashed and that all datat that wer not backed up are lost. What do you do?

  Write down sructured english for clyde-s narrative

On a trip lasting more than one day, we permit hotel, taxi, and airfare also meal allowances. Same times apply for meal expenses. Write down sructured English for Clyde's narrative of the reimbursement policies.

  If the student takes 12 credits and under

They pay $2000.00 tuition. If the student takes 12 credits and under, they pay the cost per credit that is on the input record. You need to output the student name, number of credits and total tuition.

  Write a test program that prompts the user

public static int binaryToDecimal(String binaryString)Write a test program that prompts the user to enter a binary string and displays its decimal equivalent.

  Explaining service strategy or service design

Select a topic that most interests you from Service Strategy or Service Design and then write a paper around that topic. Try to use as much of your own creativity and originality when writing the paper.

  Recover the corresponding encryption key

1. Recover the corresponding encryption key knowing that the first ciphertext word corresponds to plaintext "Recall".

  Why is internet an attractive marketing arena for business

One B2B marketer used a lot of silliness to increase its Web traffic tenfold and generate thousands of sales leads starting. Why is the Internet such an attractive marketing arena for businesses?

  Explain type to reveal computer to be computer

Explain why you think these questions would be the type to "reveal" the computer to be a computer? Why would these responses have to be given a human begin?

  Calculate the expected value for lottery game

Calculate the expected value for this game. Interpret what it means. Do not forget that you initially lose $1 by buying a ticket.

  Override the insert method in bst

You should override the insert method in BST. Your overriding method should first call the method it is overriding. When 50 insertions have been performed since the last rebalancing.

  System designer to make sure implementation went smoothly

In new system implementation, what would you do as lead system designer to make sure implementation went smoothly?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd