Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Protection of Database Security via Collaborative Inference Detection

Published: 01 August 2008 Publication History

Abstract

Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation detection system to protect sensitive data content. Based on data dependency, database schema and semantic knowledge, we con-structed a semantic inference model (SIM) that represents the possible inference channels from any at-tribute to the pre-assigned sensitive attributes. The SIM is then instantiated to a semantic inference graph (SIG) for query-time inference violation detection. For a single user case, when a user poses a query, the detection system will examine his/her past query log and calculate the probability of inferring sensitive information. The query request will be denied if the inference probability exceeds the pre-specified threshold. For multi-user cases, the users may share their query answers to increase the inference prob-ability. Therefore, we develop a model to evaluate collaborative inference based on the query sequences of collaborators and their task-sensitive collaboration levels. Experimental studies reveal that information authoritativeness, communication fidelity and honesty in collaboration are three key factors that affect the level of achievable collaboration. An example is given to illustrate the use of the proposed technique to prevent multiple collaborative users from deriving sensitive information via inference.

Cited By

View all
  • (2024)Leveraging deep learning-assisted attacks against image obfuscation via federated learningNeural Computing and Applications10.1007/s00521-024-09703-036:25(15667-15684)Online publication date: 1-Sep-2024
  • (2022)Detecting inference attacks involving sensor data in a multi‐database contextInternet Technology Letters10.1002/itl2.3875:6Online publication date: 9-Nov-2022
  • (2018)Dynamic policy adaptation for inference control of queries to a propositional information systemJournal of Computer Security10.5555/2590608.259061120:5(509-546)Online publication date: 24-Dec-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Knowledge and Data Engineering
IEEE Transactions on Knowledge and Data Engineering  Volume 20, Issue 8
August 2008
140 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 August 2008

Author Tags

  1. Inference engines
  2. Security and Privacy Protection

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Leveraging deep learning-assisted attacks against image obfuscation via federated learningNeural Computing and Applications10.1007/s00521-024-09703-036:25(15667-15684)Online publication date: 1-Sep-2024
  • (2022)Detecting inference attacks involving sensor data in a multi‐database contextInternet Technology Letters10.1002/itl2.3875:6Online publication date: 9-Nov-2022
  • (2018)Dynamic policy adaptation for inference control of queries to a propositional information systemJournal of Computer Security10.5555/2590608.259061120:5(509-546)Online publication date: 24-Dec-2018
  • (2012)An information theoretic framework for web inference detectionProceedings of the 5th ACM workshop on Security and artificial intelligence10.1145/2381896.2381902(25-36)Online publication date: 19-Oct-2012
  • (2012)A trust-and-risk aware RBAC frameworkProceedings of the 17th ACM symposium on Access Control Models and Technologies10.1145/2295136.2295168(167-176)Online publication date: 20-Jun-2012
  • (2011)History-dependent inference control of queries by dynamic policy adaptionProceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy10.5555/2029896.2029911(106-121)Online publication date: 11-Jul-2011
  • (2011)Privacy preserving via tree augmented naïve Bayesian classifier in multimedia databaseProceedings of the International Conference on Management of Emergent Digital EcoSystems10.1145/2077489.2077544(297-304)Online publication date: 21-Nov-2011
  • (2009)Detecting Inference Channels in Private Multimedia Data via Social NetworksProceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII10.1007/978-3-642-03007-9_14(208-224)Online publication date: 13-Jul-2009

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media