[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2675682.2676394acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
research-article

Quantity based aggregation for cadastral databases

Published: 04 November 2014 Publication History

Abstract

Quantity Based Aggregation (QBA) is a subject that is closely related to inference in databases. The goal is to enforce k out of N disclosure control. In this paper we work on QBA problems in the context of cadastral databases, and we focus on one particular problem: how to prevent a user from accessing all parcels in a region. This work is a new version of the model presented in [2, 3] where we introduce the concept of "Dominant Zones". This concept increases the availability of the data while preserving their confidentiality. Moreover, we provide a more detailed discussion on security aspects of different choices of the model's parameters.

References

[1]
B. Al Bouna and R. Chbeir. Detecting inference channels in private multimedia data via social networks. In Data and Applications Security XXIII, 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings, pages 208--224, 2009.
[2]
F. Al Khalil, A. Gabillon, and P. Capolsini. Collusion resistant inference control for cadastral databases. In Foundations and Practice of Security - 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers, pages 189--208, 2013.
[3]
F. Al Khalil, A. Gabillon, and P. Capolsini. Implementing quantity based aggregation control for cadastral databases. In 2014 IEEE World Congress on Services, Anchorage, AK, USA, June 27 - July 2, 2014, pages 137--144, 2014.
[4]
M. Bezzi, S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, and R. Sassi. Modeling and preventing inferences from sensitive value distributions in data release. Journal of Computer Security, 20(4):393--436, 2012.
[5]
D. F. Brewer and M. J. Nash. The chinese wall security policy. In Proceedings of the 1989 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 1-3, 1989, pages 206--214, 1989.
[6]
X. Chen and R. Wei. A dynamic method for handling the inference problem in multilevel secure databases. In International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pages 751--756, 2005.
[7]
Y. Chen and W. Chu. Protection of database security via collaborative inference detection. In Intelligence and Security Informatics, Techniques and Applications, pages 275--303. Springer, 2008.
[8]
F. Cuppens. A modal logic framework to solve aggregation problems. In Database Security, V: Status and Prospects, Results of the IFIP WG 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991, pages 315--332, 1991.
[9]
J. R. Douceur. The sybil attack. In Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers, pages 251--260, 2002.
[10]
C. Dwork. Differential privacy. In Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II, pages 1--12, 2006.
[11]
C. Dwyer. The inference problem and pervasive computing. Proceedings of Internet Research 10.0, pages 1--11, 2009.
[12]
C. Farkas and S. Jajodia. The inference problem: a survey. ACM SIGKDD Explorations Newsletter, 4(2):6--11, 2002.
[13]
S. N. Foley. A taxonomy for information flow policies and models. In IEEE Symposium on Security and Privacy, pages 98--109, 1991.
[14]
S. N. Foley. Aggregation and separation as noninterference properties. Journal of Computer Security, 1(2):159--188, 1992.
[15]
G. Friedland, G. Maier, R. Sommer, and N. Weaver. Sherlock holmes' evil twin: on the impact of global inference for online privacy. In 2011 New Security Paradigms Workshop, NSPW '11, Marin County, CA, USA, September 12-15, 2011, pages 105--114, 2011.
[16]
B. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys (CSUR), 42(4):14, 2010.
[17]
T. H. Hinke. Inference aggregation detection in database management systems. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 18-21, 1988, pages 96--106, 1988.
[18]
S. Jajodia and C. Meadows. Inference problems in multilevel secure database management systems. Information Security: An integrated collection of essays, 1:570--584, 1995.
[19]
C.-T. Li and M.-S. Hwang. An efficient biometrics-based remote user authentication scheme using smart cards. J. Network and Computer Applications, 33(1):1--5, 2010.
[20]
T. Lunt. Aggregation and inference: Facts and fallacies. In Proceedings of the 1989 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 1-3, 1989, pages 102--109, 1989.
[21]
D. G. Marks, A. Motro, and S. Jajodia. Enhancing the controlled disclosure of sensitive information. In Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings, pages 290--303, 1996.
[22]
C. Meadows. Extending the brewer-nash model to a multilevel context. In Proceedings of the 1990 IEEE Symposium on Security and Privacy, Oakland, California, USA, May -7-9, 1990, pages 95--103, 1990.
[23]
A. Motro, D. G. Marks, and S. Jajodia. Aggregation in relational databases: Controlled disclosure of sensitive information. In Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pages 431--445, 1994.
[24]
R. S. Sandhu and S. Jajodia. Polyinstantiation for cover stories. In Computer Security ESORICS 92, pages 307--328. Springer, 1992.
[25]
J. Staddon. Dynamic inference control. In Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, DMKD 2003, San Diego, California, USA, June 13, 2003, pages 94--100, 2003.
[26]
J. Staddon, P. Golle, and B. Zimny. Web-based inference detection. In Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007.
[27]
T. S. Toland, C. Farkas, and C. M. Eastman. The inference problem: Maintaining maximal availability in the presence of database updates. Computers & Security, 29(1):88--103, 2010.

Cited By

View all
  • (2016)A Quantity Based Aggregation Control Model for Graph Databases2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld)10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0145(921-929)Online publication date: Jul-2016

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
GeoPrivacy '14: Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis
November 2014
55 pages
ISBN:9781450331340
DOI:10.1145/2675682
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 November 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access control
  2. collusion
  3. database
  4. inference control
  5. security

Qualifiers

  • Research-article

Conference

SIGSPATIAL '14
Sponsor:

Acceptance Rates

GeoPrivacy '14 Paper Acceptance Rate 5 of 8 submissions, 63%;
Overall Acceptance Rate 5 of 8 submissions, 63%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2016)A Quantity Based Aggregation Control Model for Graph Databases2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld)10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0145(921-929)Online publication date: Jul-2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media