Abstract
In this paper, we present a logical model for privacy protection problem in the database linking context. Assume in the data center, there are a large amount of data records. Each record has some public attributes the values of which are known to the public and some confidential attributes the values of which are to be protected. When a data table is released, the data manager must assure that the receiver would not know the confidential data of any particular individuals by linking the releasing data and the prior information he had before receiving the data.
To solve the problem, we propose a simple epistemic logic to model the user’s knowledge. In the model, the concept of safety is rigorously defined and an effective approach is given to test the safety of the released data. It is shown that some generalization operations can be applied to the original data to make them less precise and the release of the generalized data may prevent the violation of privacy. Two kinds of generalization operations are considered. The level-based one is more restrictive, however, a bottom-up search method can be used to find the most informative data satisfying the safety requirement. On the other hand, the set-based one is more flexible, however, the computational complexity of searching through the whole spaces of this kinds of operations is much higher than the previous one though graph theory is used to simplify the discussion. As a result, heuristic methods may be needed to improve the efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
J.A. Bondy and U.S.R. Murty. Graph Theory with Applications. Macmillan, New York, 1976.
L.J. Camp. Trust and Risk in Internet Commerce. The MIT Press, 2000.
Y.C. Chiang. Protecting privacy in public database (in Chinese). Master’s thesis, Graduate Institute of Information Management, National Taiwan University, 2000.
Y.-c. Chiang, T.-s. Hsu, S. Kuo, and D.-w. Wang. Preserving confidentially when sharing medical data. In Proceedings of Asia Pacific Medical Informatics Conference, 2000.
D.E.R. Denning. Cryptography and Data Security. Addison-Wesley Publishing Company, 1982.
R. Fagin and J. Halpern. “Reasoning about knowledge and probability”. Journal of the ACM, 41(2):340–367, 1994.
R. Fagin, J.Y. Halpern, Y. Moses, and M.Y. Vardi. Reasoning about Knowledge. MIT Press, 1996.
J. Halpern. “A logical approach to reasoning about uncertainty: a tutorial”. In X. Arrazola, K. Korta, and F.J. Pelletier, editors, Discourse, Interaction, and Communication, pages 141–155. Kluwer Academic Publishers, 1998.
J. Hintikka. Knowledge and Belief. Cornell University Press, 1962.
J. Jaspars and E. Thijsse. “Fundamentals of partial modal logic”. In P. Doherty, editor, Partiality, Modality, and Nonmonotonicity, pages 111–141. CSLI Publications, 1996.
M. Morgenstern. “Controlling logical inference in multilevel database systems”. In Proc. of the IEEE Symposium on Security and Privacy, pages 245–255, 1988.
Z. Pawlak. Rough Sets-Theoretical Aspects of Reasoning about Data. Kluwer Academic Publishers, 1991.
L. Sweeney. “Guaranteeing anonymity when sharing medical data, the Datafly system”. A.I. Working Paper AIWP-WP344, MIT AI Lab., 1997.
B.C. van Fraassen. Formal Semantics and Logic. Macmillan, New York, 1971.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hsu, Ts., Liau, CJ., Wang, DW. (2001). A Logical Model for Privacy Protection. In: Davida, G.I., Frankel, Y. (eds) Information Security. ISC 2001. Lecture Notes in Computer Science, vol 2200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45439-X_8
Download citation
DOI: https://doi.org/10.1007/3-540-45439-X_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42662-2
Online ISBN: 978-3-540-45439-7
eBook Packages: Springer Book Archive