Skip to main content

Extending Cell Suppression to Protect Tabular Data against Several Attackers

  • Chapter
  • First Online:
Inference Control in Statistical Databases

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2316))

Abstract

This paper presents three mathematical models for the problem of finding a cell suppression pattern minimizing the loss of information while guaranteeing protection level requirements for different sensitive cells and different intruders. This problem covers a very general setting in Statistical Disclosure Control, and it contains as particular cases several important problems like, e.g., the so-called “common respondent problem” mentioned in Jewett [9]. Hence, the three models also applies to the common respondent problem, among others. The first model corresponds to bi-level Mathematical Programming. The second model belongs to Integer Linear Programming (ILP) and could be used on small-size tables where some nominal values are known to assume discrete values. The third model is also an ILP model valid when the nominal values of the table are continuous numbers, and with the good advantage of containing an small number of variables (one 0-1 variable for each cell in the table). On the other hand, this model has a bigger number of linear inequalities (related with the number of sensitive cells and the number of attackers). Nevertheless, this paper addresses this disadvantage which is overcame by a dynamic generation of the important inequalities when necessary. The overall algorithm follows a modern Operational Research technique known as branch-and-cut approach, and allows to find optimal solutions to medium-size tables. On large-size tables the approach can be used to find near-optimal solutions. The paper illustrates the procedure on an introductory instance.

The paper ends pointing another alternative methodology (closely related to the one in Jewett [9]) to produce patterns by shrinking all the different intruders into a single one, and compares it with the classical single-attacker methodology and with the above multi-attacker methodology.

Work supported by the European project IST-2000-25069, “Computational Aspects of Statistical Confidentiality” (CASC).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cox, L.H. (1980) Suppression Methodology and Statistical Disclosure Control. Journal of the American Statistical Association, 75, 377–385.

    Article  MATH  Google Scholar 

  2. Cox, L.J. (1995) Network Models for Complementary Cell Suppression. Journal of the American Statistical Association, 90, 1453–1462.

    Article  MATH  Google Scholar 

  3. Carvalho, F.D., Dellaert, N.P., and Osório, M.S. (1994) Statistical Disclosure in Two-Dimensional Tables: General Tables. Journal of the American Statistical Association, 89, 1547–1557.

    Article  MATH  MathSciNet  Google Scholar 

  4. Dellaert, N.P. and Luijten, W.A. (1996) Statistical Disclosure in General Three-Dimensional Tables. Technical Paper TI 96-114/9, Tinbergen Institute.

    Google Scholar 

  5. Fischetti, M. and Salazar, J.J. (1999) Models and Algorithms for the 2-Dimensional Cell Suppression Problem in Statistical Disclosure Control. Mathematical Programming, 84, 283–312.

    MATH  MathSciNet  Google Scholar 

  6. Fischetti, M. and Salazar, J.J. (2000) Models and Algorithms for Optimizing Cell Suppression Problem in Tabular Data with Linear Constraints. Journal of the American Statistical Association, 95, 916–928.

    Article  Google Scholar 

  7. Geurts, J. (1992) Heuristics for Cell Suppression in Tables. Technical Paper, Netherlands Central Bureau of Statistics, Voorburg.

    Google Scholar 

  8. Gusfield, D. (1988) A Graph Theoretic Approach to Statistical Data Security. SIAM Journal on Computing, 17, 552–571.

    Article  MATH  MathSciNet  Google Scholar 

  9. Jewett, R. (1993) Disclosure Analysis for the 1992 Economic Census. Technical paper, U.S. Bureau of the Census, Washington.

    Google Scholar 

  10. Kao, M.Y. (1996) Data Security Equals Graph Connectivity. SIAM Journal on Discrete Mathematics, 9, 87–100.

    Article  MATH  MathSciNet  Google Scholar 

  11. Kelly, J.P. (1990) Confidentiality Protection in Two and Three-Dimensional Tables. Ph.D. dissertation, University of Maryland, College Park, Maryland.

    Google Scholar 

  12. Kelly, J.P., Golden, B.L., and Assad, A.A. (1992) Cell Suppression: Disclosure Protection for Sensitive Tabular Data. Networks 22, 397–417.

    Article  MATH  Google Scholar 

  13. Nemhauser, G.L. and Wolsey, L.A. (1988) Integer and Combinatorial Optimization. New York: John Wiley & Sons.

    MATH  Google Scholar 

  14. Robertson, D.A. (1994) Cell Suppression at Statistics Canada. Proceedings of the Second International Conference on Statistical Confidentiality, Luxembourg.

    Google Scholar 

  15. Robertson, D.A. (2000) Improving Statistics Canada’s cell suppression software (CONFID). Technical paper, Statistics Canada, Ottawa, Canada.

    Google Scholar 

  16. Sande, G. (1984) Automated cell suppression to preserve confientiality of business statistics. Statistical Journal of the United Nations ECE 2, 33–41.

    Google Scholar 

  17. Sande, G. (1995) ACS documentation. Sande & Associates, 600 Sanderling Ct. Secaucus NJ, 07094 U.S.A.

    Google Scholar 

  18. Willenborg, L.C.R.J. and De Waal, T. (1996) Statistical Disclosure Control in Practice. Lecture Notes in Statistics 111. New York: Springer.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

González, J.J.S. (2002). Extending Cell Suppression to Protect Tabular Data against Several Attackers. In: Domingo-Ferrer, J. (eds) Inference Control in Statistical Databases. Lecture Notes in Computer Science, vol 2316. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47804-3_4

Download citation

  • DOI: https://doi.org/10.1007/3-540-47804-3_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43614-0

  • Online ISBN: 978-3-540-47804-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics