[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

Linear queries in statistical databases

Published: 01 June 1979 Publication History

Abstract

A database is compromised if a user can determine the data elements associated with keys which he did not know previously. If it is possible, compromise can be achieved by posing a finite set of queries over sets of data elements and employing initial information to solve the resulting system of equations. Assuming the allowable queries are linear, that is, weighted sums of data elements, we show how compromise can be achieved and we characterize the maximal initial information permitted of a user in a secure system. When compromise is possible, the initial information and the number of queries required to achieve it is surprisingly small.

References

[1]
CHIN, F.Y. Security in statistical databases for queries with small counts. ACM Trans. Database Syst. 3, 1 (March 1978), 92-104.
[2]
DAVlDA, G.I., ET AL. Data base security. TR-CS-76-14, Dept. E.E. and Comptr. Sci., U. of Wisconsin, Madison, Wis., July 1976
[3]
DEMILLO, R.A., DOBKIN, D., AND LIPTON, R.J. Even data bases that lie can be compromised. IEEE Trans. on Software Engrg. SE-4, 1 (Jan. 1977), 73-75.
[4]
DENNING, D.E., DENNING, P.J., AND SCHWARTZ, M.D. The tracker: A threat to statistical database security. ACM Trans. Database Syst: 4, 1 (March 1979), 76-96.
[5]
DENNING, D.E. Are statistical data bases secure? Proc. AFIPS 1978 NCC, Vol. 47, AFIPS Press, Montvale, N.J., pp. 525-530.
[6]
DOBKIN, D., JONES, A.K., AND LIPTON, R.J. Secure databases: Protection against user inference. ACM Trans. Database Syst. 4, 1 (March 1979), 97-106.
[7]
FELLEGI, I.P., AND PHILLIPS, J.L. Statistical confidentiality: Some theory and applications to data dissemination. Anals Econ. and Social Measmt. 3, 2 (April 1974), 399-409.
[8]
FOSTER, C., AND DANIELS, J. Running by the numbers. Runner's World (July 1975), 14-17.
[9]
GARSOUX, J. Analyse Mathematique. Dunod, Paris, 1968, p. 444.
[10]
HAQ, M.I. Security in a statistical data base. Proc. Amer. Soc. Inform. Sci. 11 (1974), 33-39.
[11]
HAQ, M.I. Insuring individual's privacy from statistical data base users. Proc. AFIPS 1975 NCC, Vol. 44, AFIPS Press, Montvale, N.J., pp. 941-946.
[12]
HOFFMAN, L.J., AND MILLER, W.F. Getting a personal dossier from a statistical data bank. Datamation 16, 5 (May 1970), 74-75.
[13]
KAM, J.B., AND ULLMAN, J.D. A model of statistical databases and their security. ACM Trans. Database Syst. 2, I (March 1977), 1-10.
[14]
REINS, S.P. Medians and data base security. Comptr. Sci. Dept., Brown U., Providence, R.I., Oct. 1977.
[15]
SCHLORER, J. Indentification and retrieval of personal records from a statistical data bank. Methods of lnform, in Medicine 14, 1 (1975), 7-13.
[16]
SCHLORER, J. Confidentiality of statistical records: A threat monitoring scheme for on-line dialogue. Methods of Inform. in Medicine 15, 1 (1976), 36-42.
[17]
SCHWARTZ, M.D. Inference from statistical data bases. Ph.D. Th., Comptr. Sci. Dept., Purdue U., W. Lafayette, Ind., Aug. 1977.
[18]
SCHWARTZ, M.D., DENNING, D.E., AND DENNING, P.J. Securing data bases under linear queries. IFIP Congress 77, North-Holland Pub. Co., Amsterdam, 1977, pp. 395-398.

Cited By

View all
  • (2022)Privacy Analysis of Query-Set-Size ControlACM Transactions on Privacy and Security10.1145/353277425:4(1-19)Online publication date: 9-Jul-2022
  • (2016)Data Security and Privacy: Concepts, Approaches, and Research Directions2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)10.1109/COMPSAC.2016.89(400-407)Online publication date: Jun-2016
  • (2016)Data privacy for IoT systems: Concepts, approaches, and research directions2016 IEEE International Conference on Big Data (Big Data)10.1109/BigData.2016.7841030(3645-3647)Online publication date: Dec-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Database Systems
ACM Transactions on Database Systems  Volume 4, Issue 2
June 1979
128 pages
ISSN:0362-5915
EISSN:1557-4644
DOI:10.1145/320071
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 1979
Published in TODS Volume 4, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. confidentiality
  2. data security
  3. database security
  4. inference
  5. linear query
  6. secure query functions
  7. statical database

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)68
  • Downloads (Last 6 weeks)13
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Privacy Analysis of Query-Set-Size ControlACM Transactions on Privacy and Security10.1145/353277425:4(1-19)Online publication date: 9-Jul-2022
  • (2016)Data Security and Privacy: Concepts, Approaches, and Research Directions2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)10.1109/COMPSAC.2016.89(400-407)Online publication date: Jun-2016
  • (2016)Data privacy for IoT systems: Concepts, approaches, and research directions2016 IEEE International Conference on Big Data (Big Data)10.1109/BigData.2016.7841030(3645-3647)Online publication date: Dec-2016
  • (2013)A theory of pricing private dataProceedings of the 16th International Conference on Database Theory10.1145/2448496.2448502(33-44)Online publication date: 18-Mar-2013
  • (2008)Measures of AnonymityPrivacy-Preserving Data Mining10.1007/978-0-387-70992-5_4(81-103)Online publication date: 2008
  • (2004)Disclosure risk measures for the sampling disclosure control methodProceedings of the 2004 ACM symposium on Applied computing10.1145/967900.967964(301-306)Online publication date: 14-Mar-2004
  • (2002)The effect of the Bootstrap method on additive fixed data perturbation in statistical databaseOmega10.1016/S0305-0483(02)00055-530:5(367-379)Online publication date: Oct-2002
  • (1996)Database FundamentalsFuzzy Databases10.1007/978-1-4613-1319-9_1(1-30)Online publication date: 1996
  • (1993)A universal-scheme approach to statistical databases containing homogeneous summary tablesACM Transactions on Database Systems10.1145/169725.16971218:4(678-708)Online publication date: 1-Dec-1993
  • (1989)Security-control methods for statistical databases: a comparative studyACM Computing Surveys10.1145/76894.7689521:4(515-556)Online publication date: 1-Dec-1989
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media