29,994 Hits in 4.1 sec

Security in statistical databases for queries with small counts

Francis Y. Chin
1978 ACM Transactions on Database Systems  
The security problem of statistical databases containing anonymous but individual records which may be evaluated by queries about sums and averages is considered.  ...  Under the assumption that the system protects the individual's information by the well-known technique which avoids publishing summaries with small counts, several properties about the system and a necessary  ...  ACKNOWLEDGMENTS The author would like to thank the referees for their careful reading of the manuscript and their helpful suggestions toward the improvement of the readability and results of this paper  ... 
doi:10.1145/320241.320250 fatcat:wq4xk4fqe5a7jg2rilq6dccbli

A Comparative Study of Query-Set Size and Fixed-Data Perturbation as Two Techniques to Secure Statistical Databases

Shouki A.Ebad
2013 International Journal of Computer Applications  
General Terms Statistical database, database security, sensitive data.  ...  In this study, two security techniques of SDBs, Query-Set Size and Fixed-Data Perturbation are selected to review and compare each other.  ...  Particularly, adding small random perturbation to the query result would be not suitable in a hospital database for example [3] [4] [6] .  ... 
doi:10.5120/11565-6856 fatcat:uqj7op4b4feutgrhdxywhnhmmy

The tracker: a threat to statistical database security

Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz
1979 ACM Transactions on Database Systems  
The general tracker is introduced: It permits calculating statistics for arbitrary query sets, without requiring preknowledge of anything in the database.  ...  It is shown that the compromise of small query sets can in fact almost always be accomplished with the help of characteristic formulas called trackers.  ...  ACKNOWLEDGMENTS We are grateful to Douglas Comer and Michael O'Donnell for insights into the proof of the Proposition in Appendix 1, and to Jan Schbrer for encouragement and for noting an error in an earlier  ... 
doi:10.1145/320064.320069 fatcat:zua7lwcfijfyjoctvjyjrbk6f4

A security machanism for statistical database

Leland L. Beck
1980 ACM Transactions on Database Systems  
The problem of user inference in statistical databases is discussed and illustrated with several examples.  ...  A method for protecting the security of such a statistical database against these types of user inference is presented and discussed.  ...  Schmeiser for many long and fruitful discussions concerning the subject of this paper, and for his suggestion of the development of a general model of user inference.  ... 
doi:10.1145/320613.320617 fatcat:hryl6p44zzbuzhh3xu5pxauzc4

Security considerations for present and future medical databases

Mirka Miller, Joan Cooper
1996 International Journal of Bio-Medical Computing  
The paper concludes with a proposal for a Security Subsystem in a database management system.  ...  However, the problem of data inference from statistical queries is particularly pertinent to medical databases and consequently we treat this problem in more detail.  ...  Classification schemes can be used to simplify the task of the authorisation subsystem in a system with a small number of well-defined types of data and users with respect to their security and clearance  ... 
doi:10.1016/0020-7101(95)01154-4 pmid:8735772 fatcat:6l5xcadb4fdgrj3ches6mwlgoi

Auditing for secure statistical databases

Francis Chin, Gultekin Ozsoyoglu
1981 Proceedings of the ACM '81 conference on - ACM 81  
A statistical database (SDB) is an ordinary database that returns statistical information to user queries.  ...  The security problem for the SDB is to control the use of the SDB so that only statistical information is available and no sequence of queries is sufficient to infer protected information about any individual  ...  INTRODUCTION The problem of enhancing the security of statistical databases (SDB) has been of growing concern in recent years. [Dobkin et al 77, Kam and Ullman 77, Schlorer 75] .  ... 
doi:10.1145/800175.809832 dblp:conf/acm/ChinO81 fatcat:vpvcbve3qngvzlpyzp76r7ut7q

Statistical database design

Francis Y. Chin, Gultekin Ozsoyoglu
1981 ACM Transactions on Database Systems  
In addition, the design also takes into consideration means of storing the query information for auditing purposes, changes in the database, users' knowledge, and some security measures.  ...  The security problem of a statistical database is to limit the use of the database so that no sequence of statistical queries is sufficient to deduce confidential or private information.  ...  ACKNOWLEDGMENT The authors would like to thank Jeffrey Sampson for his help in improving the readability of this paper.  ... 
doi:10.1145/319540.319558 fatcat:jd7dwmn2ifc27bgmhr4pqnvybu

Secure statistical databases with random sample queries

Dorothy E. Denning
1980 ACM Transactions on Database Systems  
A new inference control, called Random Sample Queries, is proposed Eor safeguarding confidential data in on-line statistical databases.  ...  Analysis shows the relative error in the statistics decreases as the query set size Increases; in contrast, the effort required to compromise increases with the query set size due to larger absolute errors  ...  in the statistics for security.  ... 
doi:10.1145/320613.320616 fatcat:gkjbuns4xzdnfa4zvib2dv2ufq

Differential privacy for public health data: An innovative tool to optimize information sharing while protecting data confidentiality

Amalie Dyda, Michael Purcell, Stephanie Curtis, Emma Field, Priyanka Pillai, Kieran Ricardo, Haotian Weng, Jessica C. Moore, Michael Hewett, Graham Williams, Colleen L. Lau
2021 Patterns  
for the use of this technology in the health sector.  ...  In layperson's terms, statistical noise is applied to the data so that overall patterns can be described, but data on individuals are unlikely to be extracted.  ...  ACKNOWLEDGMENTS We would like to acknowledge that funding for this article was provided by a grant from the Australian Partnership for Preparedness Research on Infectious Disease Emergencies (APPRISE)-  ... 
doi:10.1016/j.patter.2021.100366 pmid:34909703 pmcid:PMC8662814 fatcat:hkxjppvmejfaflqqrx2oyhipf4

Inference Attacks and Control on Database Structures

Muhamed Turkanovic, Tatjana Welzer Druzovec, Marko Hölbl
2015 TEM Journal  
This paper focuses on the inference problem on different database structures. It presents possible treats on privacy with relation to the inference, and control methods for mitigating these treats.  ...  Today's databases store information with sensitivity levels that range from public to highly sensitive, hence ensuring confidentiality can be highly important, but also requires costly control.  ...  Providing simple summary statistics in statistical databases means using only database query functions like SUM, COUNT, AVERAGE, etc. [23] .  ... 
doaj:53a50dce017a48249590cef7834197e5 fatcat:lb6u2kpqcbhxncjwvxnj4kgrrq

Auditing and Inference Control in Statistical Databases

F.Y. Chin, G. Ozsoyoglu
1982 IEEE Transactions on Software Engineering  
A statistical database (SDB) may be defined as an ordinary database with the capability of providing statistical information to user queries.  ...  The security problem for the SDB is to limit the use of the SDB so(that only statistical information is available and no sequence of queries is sufficient to infer protected information about any individual  ...  Higham for her careful reading of the manuscript and the referees for their very useful comments that improved the presentation of the paper.  ... 
doi:10.1109/tse.1982.236161 fatcat:aeofzv2vg5bkzaox4glm274raa

Mathematical techniques for the protection of patient's privacy in medical databases

Marcin Przybyłko
2011 Mathematica Applicanda  
derived from the Polish name of the institution concerned. 96 Math. tech. for the protection of patient's privacy in medical databases ESGI77  ...  While creating a central database of patients, the CSIOZ wishes to provide statistical information for selected institutions.  ...  The technique is particularly well-suited for protecting tables of relatively small frequency counts. (3.3.9) Random rounding method In this method cell values are rounded, but instead of using standard  ... 
doi:10.14708/ma.v39i1.54 fatcat:4le3bz6olnashdx6n6rfmbc2rq

Differential privacy in data publication and analysis

Yin Yang, Zhenjie Zhang, Gerome Miklau, Marianne Winslett, Xiaokui Xiao
2012 Proceedings of the 2012 international conference on Management of Data - SIGMOD '12  
Data privacy has been an important research topic in the security, theory and database communities in the last few decades.  ...  In this tutorial, we will motivate its introduction as a replacement for other paradigms, present the basics of the differential privacy model from a database perspective, describe the state of the art  ...  The last five years have seen over a hundred papers on differential privacy in the theory, security, database, machine learning, and statistics communities, with perhaps a dozen of these papers appearing  ... 
doi:10.1145/2213836.2213910 dblp:conf/sigmod/YangZMWX12 fatcat:uqrf46mpd5fqlgpmkjr3tp5g5y

An Evaluation of Two New Inference Control Methods

Y.H. Chin, Weng-Ling Peng
1987 IEEE Transactions on Software Engineering  
In general the control methods based on restriction have higher preparation cost and better security, and the control methods based on perturbation have faster response time for a query, but more information  ...  The factors of the evaluation function consist of: 1) preparation cost for the control method, 2) query complexity, and 3) security level under various attacks.  ...  Buehrer and the referees for their comments on earlier versions of the paper.  ... 
doi:10.1109/tse.1987.233143 fatcat:mw2fl5gi5ncf7kz6bptspul5he

Differential Privacy for Statistics: What we Know and What we Want to Learn

Cynthia Dwork, Adam Smith
2010 Journal of Privacy and Confidentiality  
This survey is based on two presentations given by the authors at an NCHS/CDC sponsored workshop on data privacy in May 2008.  ...  We motivate and review the definition of differential privacy, survey some results on differentially private statistical estimators, and outline a research agenda.  ...  the statistical query learning model using only a relatively small number of counting queries.  ... 
doi:10.29012/jpc.v1i2.570 fatcat:ox37yqx7fvb3ncavthwdtwhrii
« Previous Showing results 1 — 15 out of 29,994 results