Abstract
This paper presents three mathematical models for the problem of finding a cell suppression pattern minimizing the loss of information while guaranteeing protection level requirements for different sensitive cells and different intruders. This problem covers a very general setting in Statistical Disclosure Control, and it contains as particular cases several important problems like, e.g., the so-called “common respondent problem” mentioned in Jewett [9]. Hence, the three models also applies to the common respondent problem, among others. The first model corresponds to bi-level Mathematical Programming. The second model belongs to Integer Linear Programming (ILP) and could be used on small-size tables where some nominal values are known to assume discrete values. The third model is also an ILP model valid when the nominal values of the table are continuous numbers, and with the good advantage of containing an small number of variables (one 0-1 variable for each cell in the table). On the other hand, this model has a bigger number of linear inequalities (related with the number of sensitive cells and the number of attackers). Nevertheless, this paper addresses this disadvantage which is overcame by a dynamic generation of the important inequalities when necessary. The overall algorithm follows a modern Operational Research technique known as branch-and-cut approach, and allows to find optimal solutions to medium-size tables. On large-size tables the approach can be used to find near-optimal solutions. The paper illustrates the procedure on an introductory instance.
The paper ends pointing another alternative methodology (closely related to the one in Jewett [9]) to produce patterns by shrinking all the different intruders into a single one, and compares it with the classical single-attacker methodology and with the above multi-attacker methodology.
Work supported by the European project IST-2000-25069, “Computational Aspects of Statistical Confidentiality” (CASC).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cox, L.H. (1980) Suppression Methodology and Statistical Disclosure Control. Journal of the American Statistical Association, 75, 377–385.
Cox, L.J. (1995) Network Models for Complementary Cell Suppression. Journal of the American Statistical Association, 90, 1453–1462.
Carvalho, F.D., Dellaert, N.P., and Osório, M.S. (1994) Statistical Disclosure in Two-Dimensional Tables: General Tables. Journal of the American Statistical Association, 89, 1547–1557.
Dellaert, N.P. and Luijten, W.A. (1996) Statistical Disclosure in General Three-Dimensional Tables. Technical Paper TI 96-114/9, Tinbergen Institute.
Fischetti, M. and Salazar, J.J. (1999) Models and Algorithms for the 2-Dimensional Cell Suppression Problem in Statistical Disclosure Control. Mathematical Programming, 84, 283–312.
Fischetti, M. and Salazar, J.J. (2000) Models and Algorithms for Optimizing Cell Suppression Problem in Tabular Data with Linear Constraints. Journal of the American Statistical Association, 95, 916–928.
Geurts, J. (1992) Heuristics for Cell Suppression in Tables. Technical Paper, Netherlands Central Bureau of Statistics, Voorburg.
Gusfield, D. (1988) A Graph Theoretic Approach to Statistical Data Security. SIAM Journal on Computing, 17, 552–571.
Jewett, R. (1993) Disclosure Analysis for the 1992 Economic Census. Technical paper, U.S. Bureau of the Census, Washington.
Kao, M.Y. (1996) Data Security Equals Graph Connectivity. SIAM Journal on Discrete Mathematics, 9, 87–100.
Kelly, J.P. (1990) Confidentiality Protection in Two and Three-Dimensional Tables. Ph.D. dissertation, University of Maryland, College Park, Maryland.
Kelly, J.P., Golden, B.L., and Assad, A.A. (1992) Cell Suppression: Disclosure Protection for Sensitive Tabular Data. Networks 22, 397–417.
Nemhauser, G.L. and Wolsey, L.A. (1988) Integer and Combinatorial Optimization. New York: John Wiley & Sons.
Robertson, D.A. (1994) Cell Suppression at Statistics Canada. Proceedings of the Second International Conference on Statistical Confidentiality, Luxembourg.
Robertson, D.A. (2000) Improving Statistics Canada’s cell suppression software (CONFID). Technical paper, Statistics Canada, Ottawa, Canada.
Sande, G. (1984) Automated cell suppression to preserve confientiality of business statistics. Statistical Journal of the United Nations ECE 2, 33–41.
Sande, G. (1995) ACS documentation. Sande & Associates, 600 Sanderling Ct. Secaucus NJ, 07094 U.S.A.
Willenborg, L.C.R.J. and De Waal, T. (1996) Statistical Disclosure Control in Practice. Lecture Notes in Statistics 111. New York: Springer.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
González, J.J.S. (2002). Extending Cell Suppression to Protect Tabular Data against Several Attackers. In: Domingo-Ferrer, J. (eds) Inference Control in Statistical Databases. Lecture Notes in Computer Science, vol 2316. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47804-3_4
Download citation
DOI: https://doi.org/10.1007/3-540-47804-3_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43614-0
Online ISBN: 978-3-540-47804-1
eBook Packages: Springer Book Archive