Abstract
In this paper we present a novel inference control technique, based on graphs, to control the number of accessible parcels in a cadastral database. Different levels of collusion resistance are introduced as part of the approach. The dynamic aspect of the cadastral application, caused by mutation operations, is handled. We propose a scheme for gradually resetting the inference graph allowing continuous access to the data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Les guides de la cnil. les collectivités locales. http://www.cnil.fr/fileadmin/documents/Guides_pratiques/CNIL_Guide_CollLocales.pdf (2009)
Fiscalité locale et cadastre. http://www.cada.fr/fiscalite-locale-et-cadastre,6090.html. Accessed June 2013
Biskup, J., Bonatti, P.: Controlled query evaluation for known policies by combining lying and refusal. Ann. Math. Artif. Intell. 40(1), 37–62 (2004)
Biskup, J., Tadros, C.: Inference-proof view update transactions with minimal refusals. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM 2011 and SETOP 2011. LNCS, vol. 7122, pp. 104–121. Springer, Heidelberg (2012)
Chen, Y., Chu, W.: Protection of database security via collaborative inference detection. In: Chen, H., Yang, C.C. (eds.) Intelligence and Security Informatics, pp. 275–303. Springer, Heidelberg (2008)
Conejo, C., Velasco, A.: Cadastral web services in spain. http://www.ec-gis.org/Workshops/13ec-gis/presentations/4_sdi_implementaion_I_Conejo_1.pdf. Accessed June 2013
Cuppens, F., Gabillon, A.: Logical foundations of multilevel databases. Data Knowl. Eng. 29(3), 259–291 (1999)
Cuppens, F., Gabillon, A.: Cover story management. Data Knowl. Eng. 37(2), 177–201 (2001)
Delugach, H., Hinke, T.: Wizard: a database inference analysis and detection system. IEEE Trans. Knowl. Data Eng. 8(1), 56–66 (1996)
Denning, D.E., Lunt, T.F., Schell, R.R., Shockley, W.R., Heckman, M.: The seaview security model. In: Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988, pp. 218–233. IEEE (1988)
Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008)
Farkas, C., Jajodia, S.: The inference problem: a survey. ACM SIGKDD Explor. Newsl. 4(2), 6–11 (2002)
Farkas, C., Toland, T.S., Eastman, C.M.: The inference problem and updates in relational databases. In: Proceedings of the Fifteenth Annual Working Conference on Database and Application Security Das’01, pp. 181–194. Kluwer Academic Publishers, Norwell (2002)
Jajodia, S., Meadows, C.: Inference problems in multilevel secure database management systems. In: Abrams, M.D., Jajodia, S., Podell, H. (eds.) Information Security: An Integrated Collection of Essays, pp. 570–584. IEEE Computer Society Press, Los Alamitos (1995)
Katos, V., Vrakas, D., Katsaros, P.: A framework for access control with inference constraints. In: 2011 IEEE 35th Annual Computer Software and Applications Conference (COMPSAC), pp. 289–297. IEEE (2011)
Lunt, T.F.: Aggregation and inference: facts and fallacies. In: Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989, pp. 102–109. IEEE (1989)
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 1(1), 3 (2007)
McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: 48th Annual IEEE Symposium on Foundations of Computer Science, 2007, FOCS’07, pp. 94–103. IEEE (2007)
Sandhu, R.S., Jajodia, S.: Polyinstantiation for cover stories. In: Deswarte, Y., Quisquater, J.-J., Eizenberg, G. (eds.) Computer Security - ESORICS 92. LNCS, vol. 648, pp. 305–328. Springer, Heidelberg (1992)
Staddon, J.: Dynamic inference control. In: Proceedings of the 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, pp. 94–100. ACM (2003)
Staddon, J., Golle, P., Zimny, B.: Web-based inference detection. In: Proceedings of 16th USENIX Security Symposium, pp. 71–86 (2007)
Sweeney, L.: Simple Demographics Often Identify People Uniquely. Health (San Francisco), pp. 1–34. Carnegie Mellon University, Pittsburgh (2000)
Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557–570 (2002)
Toland, T., Farkas, C., Eastman, C.: The inference problem: maintaining maximal availability in the presence of database updates. Comput. Secur. 29(1), 88–103 (2010)
Xiao, X., Tao, Y.: Anatomy: simple and effective privacy preservation. In: Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 139–150. VLDB Endowment (2006)
Yang, X., Li, C.: Secure xml publishing without information leakage in the presence of data inference. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases, vol. 30, pp. 96–107. VLDB Endowment (2004)
Yip, R., Levitt, E.: Data level inference detection in database systems. In: Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998, pp. 179–189. IEEE (1998)
Yixiang, D., Tao, P., Minghua, J.: Secure multiple xml documents publishing without information leakage. In: International Conference on Convergence Information Technology, 2007, pp. 2114–2119. IEEE (2007)
Acknowledgments
The authors wish to thank the following people for fruitful discussions on some legal aspects applying to the cadastral application and for providing them access to a sample cadastral database. – Tania Berthou, Directrice des Affaires Foncières de la Polynésie Française; – Bertrand Malet, Chef de la Division du Cadastre, Direction des Affaires Foncières; – Jean-Louis Garry, Directeur du Service Informatique de la Polynésie Française; – Emmanuel Bouniot, Chef de la Cellule Systèmes d’Informations Géographique du Service Informatique de la Polynésie Française.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Al Khalil, F., Gabillon, A., Capolsini, P. (2014). Collusion Resistant Inference Control for Cadastral Databases. In: Danger, J., Debbabi, M., Marion, JY., Garcia-Alfaro, J., Zincir Heywood, N. (eds) Foundations and Practice of Security. FPS 2013. Lecture Notes in Computer Science(), vol 8352. Springer, Cham. https://doi.org/10.1007/978-3-319-05302-8_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-05302-8_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-05301-1
Online ISBN: 978-3-319-05302-8
eBook Packages: Computer ScienceComputer Science (R0)