Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

The statistical security of a statistical database

Published: 05 December 1984 Publication History

Abstract

This note proposes a statistical perturbation scheme to protect a statistical database against compromise. The proposed scheme can handle the security of numerical as well as nonnumerical sensitive fields. Furthermore, knowledge of some records in a database does not help to compromise unknown records. We use Chebyshev's inequality to analyze the trade-offs among the magnitude of the perturbations, the error incurred by statistical queries, and the size of the query set to which they apply. We show that if the statistician is given absolute error guarantees, then a compromise is possible, but the cost is made exponential in the size of the database.

References

[1]
BECK, L. A security mechanism for statistical databases. ACM Trans. Database Syst., 5, 1 (1980).
[2]
CONWAY, R., AND STRIP, D. Selective partial access to a database. In Proceedings ACM National Conference (Oct. 1976), 85-89.
[3]
DENNING, D.E., DENNING, P.J., AND SCHWARTZ, M.D. The tracker: A threat to statistical database security. ACM Trans. Database Syst. 4 (1979), 76-96.
[4]
DOBKIN, D., JONES, A.K., AND LIPTON, R. Secure databases: Protection against user influence. ACM Trans. Database Syst. 4 (1979), 97-106.
[5]
FELLEGI, I.P., AND PHILLIPS, J.L. Statistical confidentiality: Some theory and applications to data dissemination. Ann. Econ. Sot. Measure (1974), 399-409.
[6]
HAMMING, R.W. Coding and Information Theory. Prentice-Hall, Englewood Cliffs, N.J., 1980.
[7]
KNUTH, D.E. The Art of Computer Programming. Vol. 1. Addison-Wesley, Reading, Mass., 1973.
[8]
SCHLORER, J. Disclosure from statistical databases: Quantitative aspects of trackers. ACM Trans. Database Syst. 5 (1980), 467-492.
[9]
ULLMAN, J.D. Principles of Database Systems. Computer Science Press, Rockville, Md., 1980.
[10]
WARNER, S.L. The linear randomized response model. J. Am. Stat. Assoc. 66 (1971),884-888.

Cited By

View all
  • (2023)Database Reconstruction Is Not So Easy and Is Different from ReidentificationJournal of Official Statistics10.2478/jos-2023-001739:3(381-398)Online publication date: 7-Sep-2023
  • (2022)Implications of Data Anonymization on the Statistical Evidence of DisparityManagement Science10.1287/mnsc.2021.402868:4(2600-2618)Online publication date: 1-Apr-2022
  • (2022)A Novel Mixed Integer Programming Formulation for Data Perturbation2022 7th International Conference on Big Data Analytics (ICBDA)10.1109/ICBDA55095.2022.9760361(35-39)Online publication date: 4-Mar-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Database Systems
ACM Transactions on Database Systems  Volume 9, Issue 4
Dec. 1984
208 pages
ISSN:0362-5915
EISSN:1557-4644
DOI:10.1145/1994
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 December 1984
Published in TODS Volume 9, Issue 4

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)65
  • Downloads (Last 6 weeks)7
Reflects downloads up to 20 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Database Reconstruction Is Not So Easy and Is Different from ReidentificationJournal of Official Statistics10.2478/jos-2023-001739:3(381-398)Online publication date: 7-Sep-2023
  • (2022)Implications of Data Anonymization on the Statistical Evidence of DisparityManagement Science10.1287/mnsc.2021.402868:4(2600-2618)Online publication date: 1-Apr-2022
  • (2022)A Novel Mixed Integer Programming Formulation for Data Perturbation2022 7th International Conference on Big Data Analytics (ICBDA)10.1109/ICBDA55095.2022.9760361(35-39)Online publication date: 4-Mar-2022
  • (2022)An access and inference control model for time series databasesFuture Generation Computer Systems10.1016/j.future.2018.09.05792:C(93-108)Online publication date: 15-Apr-2022
  • (2021)Differentially private ensemble learning for classificationNeurocomputing10.1016/j.neucom.2020.12.051430(34-46)Online publication date: Mar-2021
  • (2021)Prescriptive analytics with differential privacyInternational Journal of Data Science and Analytics10.1007/s41060-021-00286-w13:2(123-138)Online publication date: 22-Sep-2021
  • (2020)Linear Regression from Strategic Data SourcesACM Transactions on Economics and Computation10.1145/33914368:2(1-24)Online publication date: 13-May-2020
  • (2020)TPEGADP: improvement of EGADP based on topology potential2020 5th IEEE International Conference on Big Data Analytics (ICBDA)10.1109/ICBDA49040.2020.9101253(226-230)Online publication date: May-2020
  • (2020)A Novel Approach to Collectively Determine Cybersecurity Performance Benchmark DataDesign Science Research. Cases10.1007/978-3-030-46781-4_2(17-41)Online publication date: 24-Sep-2020
  • (2019)An Empirical Study of Applying Statistical Disclosure Control Methods to Public Health ResearchInternational Journal of Environmental Research and Public Health10.3390/ijerph1622451916:22(4519)Online publication date: 15-Nov-2019
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media