A Data Distortion by Probability Distribution.
Chong K. Liew, Uinam J. Choi, Chung J. Liew:
A Data Distortion by Probability Distribution.
ACM Trans. Database Syst. 10(3): 395-411(1985)@article{DBLP:journals/tods/LiewCL85,
author = {Chong K. Liew and
Uinam J. Choi and
Chung J. Liew},
title = {A Data Distortion by Probability Distribution},
journal = {ACM Trans. Database Syst.},
volume = {10},
number = {3},
year = {1985},
pages = {395-411},
ee = {http://doi.acm.org/10.1145/3979.4017, db/journals/tods/LiewCL85.html},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
Abstract
This paper introduces data distortion by probability distribution,
a probability distortion that involves three steps. The first step
is to identify the underlying density function of the original
series and to estimate the parameters of this density function.
The second step is to generate a series of data from the estimated
density function. And the final step is to map and replace the
generated series for the original one. Because it is replaced by
the distorted data set, probability distortion guards the privacy
of an individual belonging to the original data set. At the same
time, the probability distorted series provides asymptotically the
same statistical properties as those of the original series, since
both are under the same distribution. Unlike conventional point
distortion, probability distortion is difficult to compromise by
repeated queries, and provides a maximum exposure for statistical
analysis.
Copyright © 1985 by the ACM,
Inc., used by permission. Permission to make
digital or hard copies is granted provided that
copies are not made or distributed for profit or
direct commercial advantage, and that copies show
this notice on the first page or initial screen of
a display along with the full citation.
CDROM Version: Load the CDROM "Volume 3 Issue 1, TODS 1976-1990" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 2" and ...
BibTeX
References
- [1]
- Leland L. Beck:
A Security Mechanism for Statistical Databases.
ACM Trans. Database Syst. 5(3): 316-338(1980) BibTeX
- [2]
- ...
- [3]
- ...
- [4]
- ...
- [5]
- ...
- [6]
- George I. Davida, David J. Linton, C. Russel Szelag, David L. Wells:
Database Security.
IEEE Trans. Software Eng. 4(6): 531-533(1978) BibTeX
- [7]
- Dorothy E. Denning, Peter J. Denning:
Data Security.
ACM Comput. Surv. 11(3): 227-249(1979) BibTeX
- [8]
- ...
- [9]
- Dorothy E. Denning:
Secure Statistical Databases with Random Sample Queries.
ACM Trans. Database Syst. 5(3): 291-315(1980) BibTeX
- [10]
- David P. Dobkin, Anita K. Jones, Richard J. Lipton:
Secure Databases: Protection Against User Influence.
ACM Trans. Database Syst. 4(1): 97-106(1979) BibTeX
- [11]
- ...
- [12]
- ...
- [13]
- ...
- [14]
- ...
- [15]
- ...
- [16]
- ...
- [17]
- ...
- [18]
- ...
- [19]
- ...
- [20]
- ...
- [21]
- Steven P. Reiss:
Practical Data-Swapping: The First Steps.
ACM Trans. Database Syst. 9(1): 20-37(1984) BibTeX
- [22]
- Clement T. Yu, Francis Y. L. Chin:
A Study on the Protection of Statistical Data Bases.
SIGMOD Conference 1977: 169-181 BibTeX
- [23]
- ...
Referenced by
- Rakesh Agrawal, Ramakrishnan Srikant:
Privacy-Preserving Data Mining.
SIGMOD Conference 2000: 439-450
- Jon M. Kleinberg, Christos H. Papadimitriou, Prabhakar Raghavan:
Auditing Boolean Attributes.
PODS 2000: 86-91
- Daniel Stamate, Henri Luchian, Ben Paechter:
A General Model for the Answer-Perturbation Techniques.
SSDBM 1994: 90-96
- Francesco M. Malvestuto:
Statistical versus Relational Join Dependencies.
SSDBM 1994: 64-73
- Nabil R. Adam, John C. Wortmann:
Security-Control Methods for Statistical Databases: A Comparative Study.
ACM Comput. Surv. 21(4): 515-556(1989)
BibTeX
ACM SIGMOD Anthology - DBLP:
[Home | Search: Author, Title | Conferences | Journals]
TODS, ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Tue Jun 24 18:38:58 2008