A Modified Random Perturbation Method for Database Security.
Patrick Tendick, Norman S. Matloff:
A Modified Random Perturbation Method for Database Security.
ACM Trans. Database Syst. 19(1): 47-63(1994)@article{DBLP:journals/tods/TendickM94,
author = {Patrick Tendick and
Norman S. Matloff},
title = {A Modified Random Perturbation Method for Database Security},
journal = {ACM Trans. Database Syst.},
volume = {19},
number = {1},
year = {1994},
pages = {47-63},
ee = {http://doi.acm.org/10.1145/174638.174641, db/journals/tods/TendickM94.html},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
Abstract
The random data perturbation (RDP) method of preserving the privacy of individual records in a statistical database is discussed. In particular, it is shown that if confidential attributes are allowed as query-defining variables, severe biases may result in responses to queries. It is also shown that even if query definition through confidential variables is not allowed, biases can still occur in responses to queries such as those involving proportions or counts. In either case, serious distortions may occur in user statistical analyses. A modified version of RDP is presented, in the form of a query adjustment procedure and specialized perturbation structure which will produce unbiased results.
Copyright © 1994 by the ACM,
Inc., used by permission. Permission to make
digital or hard copies is granted provided that
copies are not made or distributed for profit or
direct commercial advantage, and that copies show
this notice on the first page or initial screen of
a display along with the full citation.
CDROM Version: Load the CDROM "Volume 3 Issue 2, TODS 1991-1995, TKDE 1989-1992" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 2" and ...
BibTeX
[Abstract, Index Terms and Review]
[Full Text in PDF Format, 1016 KB]
References
- [Adam and Wortmann 1989]
- Nabil R. Adam, John C. Wortmann:
Security-Control Methods for Statistical Databases: A Comparative Study.
ACM Comput. Surv. 21(4): 515-556(1989) BibTeX
- [Cochran 1977]
- ...
- [Conway and Strip 1976]
- ...
- [Cox 1980]
- ...
- [de Jonge 1983]
- Wiebren de Jonge:
Compromising Statistical Databases Responding to Queries about Means.
ACM Trans. Database Syst. 8(1): 60-80(1983) BibTeX
- [Denning 1982]
- Dorothy E. Denning:
Cryptography and Data Security.
Addison-Wesley 1982
BibTeX
- [Denning and Schlörer 1983]
- Dorothy E. Denning, Jan Schlörer:
Inference Controls for Statistical Databases.
IEEE Computer 16(7): 69-82(1983) BibTeX
- [Denning et al. 1979]
- Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz:
The Tracker: A Threat to Statistical Database Security.
ACM Trans. Database Syst. 4(1): 76-96(1979) BibTeX
- [Johnson and Wichem 1982]
- ...
- [Kim 1986]
- ...
- [Matloff 1988]
- Norman S. Matloff:
Inference Control Via Query Restriction Vs. Data Modification: A Perspective.
DBSec 1987: 159-166 BibTeX
- [Matloff 1986]
- ...
- [Matloff 1984]
- ...
- [Matloff and Tendick 1988]
- Norman S. Matloff, Patrick Tendick:
The 'Curse of Dimensionality' in Database Security.
DBSec 1988: 225-232 BibTeX
- [Noble and Daniel 1988]
- ...
- [Rao 1973]
- ...
- [Schlörer 1980]
- Jan Schlörer:
Disclosure from Statistical Databases: Quantitative Aspects of Trackers.
ACM Trans. Database Syst. 5(4): 467-492(1980) BibTeX
- [Seber 1977]
- ...
- [Tendick 1988]
- ...
- [Tendick and Matloff 1987]
- ...
- [Traub et al. 1984]
- Joseph F. Traub, Yechiam Yemini, Henryk Wozniakowski:
The Statistical Security of a Statistical Database.
ACM Trans. Database Syst. 9(4): 672-679(1984) BibTeX
BibTeX
ACM SIGMOD Anthology - DBLP:
[Home | Search: Author, Title | Conferences | Journals]
TODS, ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Tue Jun 24 18:39:15 2008