ACM SIGMOD Anthology TODS dblp.uni-trier.de

Secure Statistical Databases with Random Sample Queries.

Dorothy E. Denning: Secure Statistical Databases with Random Sample Queries. ACM Trans. Database Syst. 5(3): 291-315(1980)
@article{DBLP:journals/tods/Denning80,
  author    = {Dorothy E. Denning},
  title     = {Secure Statistical Databases with Random Sample Queries},
  journal   = {ACM Trans. Database Syst.},
  volume    = {5},
  number    = {3},
  year      = {1980},
  pages     = {291-315},
  ee        = {http://doi.acm.org/10.1145/320613.320616, db/journals/tods/Denning80.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

A new inference control, called random sample queries, is proposed for safeguarding confidential data in on-line statistical databases. The random sample queries control deals directly with the basic principle of compromise by making it impossible for a questioner to control precisely the formation of query sets. Queries for relative frequencies and averages are computed using random samples drawn from the query sets. The sampling strategy permits the release of accurate and timely statistics and can be implemented at very low cost. Analysis shows the relative error in the statistics decreases as the query set size increases; in contrast, the effort required to compromise increases with the query set size due to large absolute errors. Experiments performed on a simulated database support the analysis.

Copyright © 1980 by the ACM, Inc., used by permission. Permission to make digital or hard copies is granted provided that copies are not made or distributed for profit or direct commercial advantage, and that copies show this notice on the first page or initial screen of a display along with the full citation.


Joint ACM SIGMOD / IEEE Computer Society Anthology

CDROM Version: Load the CDROM "Volume 3 Issue 1, TODS 1976-1990" and ... DVD Version: Load ACM SIGMOD Anthology DVD 2" and ... BibTeX

References

[1]
...
[2]
Leland L. Beck: A Security Mechanism for Statistical Databases. ACM Trans. Database Syst. 5(3): 316-338(1980) BibTeX
[3]
...
[4]
...
[5]
Francis Y. L. Chin: Security in Statistical Databases for Queries with Small Counts. ACM Trans. Database Syst. 3(1): 92-104(1978) BibTeX
[6]
...
[7]
...
[8]
George I. Davida, David J. Linton, C. Russel Szelag, David L. Wells: Database Security. IEEE Trans. Software Eng. 4(6): 531-533(1978) BibTeX
[9]
Richard A. DeMillo, David P. Dobkin, Richard J. Lipton: Even Data Bases That Lie Can Be Compromised. IEEE Trans. Software Eng. 4(1): 73-75(1978) BibTeX
[10]
...
[11]
...
[12]
Dorothy E. Denning, Peter J. Denning: Data Security. ACM Comput. Surv. 11(3): 227-249(1979) BibTeX
[13]
Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz: The Tracker: A Threat to Statistical Database Security. ACM Trans. Database Syst. 4(1): 76-96(1979) BibTeX
[14]
Dorothy E. Denning, Jan Schlörer: A Fast Procedure for Finding a Tracker in a Statistical Database. ACM Trans. Database Syst. 5(1): 88-102(1980) BibTeX
[15]
...
[16]
David P. Dobkin, Anita K. Jones, Richard J. Lipton: Secure Databases: Protection Against User Influence. ACM Trans. Database Syst. 4(1): 97-106(1979) BibTeX
[17]
...
[18]
...
[19]
...
[20]
...
[21]
...
[22]
...
[23]
John B. Kam, Jeffrey D. Ullman: A Model of Statistical Databases and Their Security. ACM Trans. Database Syst. 2(1): 1-10(1977) BibTeX
[24]
...
[25]
...
[26]
...
[27]
...
[28]
...
[29]
...
[30]
...
[31]
Jan Schlörer: Disclosure from Statistical Databases: Quantitative Aspects of Trackers. ACM Trans. Database Syst. 5(4): 467-492(1980) BibTeX
[32]
...
[33]
...
[34]
...
[35]
...
[36]
Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning: Linear Queries in Statistical Databases. ACM Trans. Database Syst. 4(2): 156-167(1979) BibTeX
[37]
Clement T. Yu, Francis Y. L. Chin: A Study on the Protection of Statistical Data Bases. SIGMOD Conference 1977: 169-181 BibTeX

Referenced by

  1. Rakesh Agrawal, Ramakrishnan Srikant: Privacy-Preserving Data Mining. SIGMOD Conference 2000: 439-450
  2. Frank Olken, Doron Rotem: Maintenance of Materialized Views of Sampling Queries. ICDE 1992: 632-641
  3. Sakti P. Ghosh: Statistical Relational Databases: Normal Forms. IEEE Trans. Knowl. Data Eng. 3(1): 55-64(1991)
  4. Frank Olken, Doron Rotem: Random Sampling from Database Files: A Survey. SSDBM 1990: 92-111
  5. Frank Olken, Doron Rotem, Ping Xu: Random Sampling from Hash Files. SIGMOD Conference 1990: 375-386
  6. Mary McLeish: Further Results on the Security of Partitioned Dynamic Statistical Databases. ACM Trans. Database Syst. 14(1): 98-113(1989)
  7. Nabil R. Adam, John C. Wortmann: Security-Control Methods for Statistical Databases: A Comparative Study. ACM Comput. Surv. 21(4): 515-556(1989)
  8. Maurizio Rafanelli: Research Topics in Statistical and Scientific Database Management: the IV SSDBM. SSDBM 1988: 1-18
  9. Michael A. Palley, Jeffrey S. Simonoff: The Use of Regression Methodology for the Compromise of Confidential Information in Statistical Databases. ACM Trans. Database Syst. 12(4): 593-608(1987)
  10. Chong K. Liew, Uinam J. Choi, Chung J. Liew: A Data Distortion by Probability Distribution. ACM Trans. Database Syst. 10(3): 395-411(1985)
  11. Chaitanya K. Baru, Stanley Y. W. Su: Performance Evaluation of the Statistical Aggregation by Caterogization in the SM3 System. SIGMOD Conference 1984: 77-89
  12. Ezio Lefons, Alberto Silvestri, Filippo Tangorra: An Analytic Approach to Statistical Databases. VLDB 1983: 260-274
  13. Zbigniew Michalewicz: Statistical Databases: Their Model, Query Language and Security. SSDBM 1983: 391-402
  14. Dorothy E. Denning: A Security Model for the Statistical Database Problem. SSDBM 1983: 368-390
  15. Arie Shoshani: Statistical Databases: Characteristics, Problems, and some Solutions. VLDB 1982: 208-222
  16. Steven P. Reiss, Mark J. Post, Tore Dalenius: Non-reversible Privacy Transformations. PODS 1982: 139-146
  17. Francis Y. L. Chin, Gultekin Özsoyoglu: Statistical Database Design. ACM Trans. Database Syst. 6(1): 113-139(1981)
  18. Jitender S. Deogun, Vijay V. Raghavan: Query Directed Partitioning Scheme for Securing Statistical Databases. SSDBM 1981: 285-293
  19. Francis Y. L. Chin, Peter Kossowski: Efficient Inference Control for Range SUM Queries on Statistical Data Bases. SSDBM 1981: 239-248
  20. Jan Schlörer: Disclosure from Statistical Databases: Quantitative Aspects of Trackers. ACM Trans. Database Syst. 5(4): 467-492(1980)
  21. Leland L. Beck: A Security Mechanism for Statistical Databases. ACM Trans. Database Syst. 5(3): 316-338(1980)
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
TODS, ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sun May 17 00:29:46 2009