Skip to main content

A Logical Model for Privacy Protection

  • Conference paper
  • First Online:
Book cover Information Security (ISC 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2200))

Included in the following conference series:

Abstract

In this paper, we present a logical model for privacy protection problem in the database linking context. Assume in the data center, there are a large amount of data records. Each record has some public attributes the values of which are known to the public and some confidential attributes the values of which are to be protected. When a data table is released, the data manager must assure that the receiver would not know the confidential data of any particular individuals by linking the releasing data and the prior information he had before receiving the data.

To solve the problem, we propose a simple epistemic logic to model the user’s knowledge. In the model, the concept of safety is rigorously defined and an effective approach is given to test the safety of the released data. It is shown that some generalization operations can be applied to the original data to make them less precise and the release of the generalized data may prevent the violation of privacy. Two kinds of generalization operations are considered. The level-based one is more restrictive, however, a bottom-up search method can be used to find the most informative data satisfying the safety requirement. On the other hand, the set-based one is more flexible, however, the computational complexity of searching through the whole spaces of this kinds of operations is much higher than the previous one though graph theory is used to simplify the discussion. As a result, heuristic methods may be needed to improve the efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J.A. Bondy and U.S.R. Murty. Graph Theory with Applications. Macmillan, New York, 1976.

    Google Scholar 

  2. L.J. Camp. Trust and Risk in Internet Commerce. The MIT Press, 2000.

    Google Scholar 

  3. Y.C. Chiang. Protecting privacy in public database (in Chinese). Master’s thesis, Graduate Institute of Information Management, National Taiwan University, 2000.

    Google Scholar 

  4. Y.-c. Chiang, T.-s. Hsu, S. Kuo, and D.-w. Wang. Preserving confidentially when sharing medical data. In Proceedings of Asia Pacific Medical Informatics Conference, 2000.

    Google Scholar 

  5. D.E.R. Denning. Cryptography and Data Security. Addison-Wesley Publishing Company, 1982.

    Google Scholar 

  6. R. Fagin and J. Halpern. “Reasoning about knowledge and probability”. Journal of the ACM, 41(2):340–367, 1994.

    Article  MATH  MathSciNet  Google Scholar 

  7. R. Fagin, J.Y. Halpern, Y. Moses, and M.Y. Vardi. Reasoning about Knowledge. MIT Press, 1996.

    Google Scholar 

  8. J. Halpern. “A logical approach to reasoning about uncertainty: a tutorial”. In X. Arrazola, K. Korta, and F.J. Pelletier, editors, Discourse, Interaction, and Communication, pages 141–155. Kluwer Academic Publishers, 1998.

    Google Scholar 

  9. J. Hintikka. Knowledge and Belief. Cornell University Press, 1962.

    Google Scholar 

  10. J. Jaspars and E. Thijsse. “Fundamentals of partial modal logic”. In P. Doherty, editor, Partiality, Modality, and Nonmonotonicity, pages 111–141. CSLI Publications, 1996.

    Google Scholar 

  11. M. Morgenstern. “Controlling logical inference in multilevel database systems”. In Proc. of the IEEE Symposium on Security and Privacy, pages 245–255, 1988.

    Google Scholar 

  12. Z. Pawlak. Rough Sets-Theoretical Aspects of Reasoning about Data. Kluwer Academic Publishers, 1991.

    Google Scholar 

  13. L. Sweeney. “Guaranteeing anonymity when sharing medical data, the Datafly system”. A.I. Working Paper AIWP-WP344, MIT AI Lab., 1997.

    Google Scholar 

  14. B.C. van Fraassen. Formal Semantics and Logic. Macmillan, New York, 1971.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hsu, Ts., Liau, CJ., Wang, DW. (2001). A Logical Model for Privacy Protection. In: Davida, G.I., Frankel, Y. (eds) Information Security. ISC 2001. Lecture Notes in Computer Science, vol 2200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45439-X_8

Download citation

  • DOI: https://doi.org/10.1007/3-540-45439-X_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42662-2

  • Online ISBN: 978-3-540-45439-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics