Skip to main content

Protecting Individual Information Against Inference Attacks in Data Publishing

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4443))

Abstract

In many data-publishing applications, the data owner needs to protect sensitive information pertaining to individuals. Meanwhile, certain information is required to be published. The sensitive information could be considered as leaked, if an adversary can infer the real value of a sensitive entry with a high confidence. In this paper we study how to protect sensitive data when an adversary can do inference attacks using association rules derived from the data. We formulate the inference attack model, and develop complexity results on computing a safe partial table. We classify the general problem into subcases based on the requirements of publishing information, and propose the corresponding algorithms for finding a safe partial table to publish. We have conducted an empirical study to evaluate these algorithms on real data.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yang, X., Li, C.: Secure XML publishing without information leakage in the presence of data inference. In: VLDB (2004)

    Google Scholar 

  2. Verykios, V.S., Bertino, E., Fovino, I.N., et al.: State-of-the-art in privacy preserving data mining. SIGMOD Record 33(1), 50–57 (2004)

    Article  Google Scholar 

  3. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  4. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: SIGMOD Conference, pp. 439–450 (2000)

    Google Scholar 

  5. Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: KDD, pp. 217–228 (2002)

    Google Scholar 

  6. Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure limitation of sensitive rules (1999)

    Google Scholar 

  7. Saygin, Y., Verykios, V.S., Clifton, C.: Using unknowns to prevent discovery of association rules. SIGMOD Record 30(4), 45–54 (2001)

    Article  Google Scholar 

  8. Aggarwal, C., Pei, J., Zhang, B.: On Privacy Preservation against Adversarial Data Mining. In: Proceedings of ACM SIGKDD (2006)

    Google Scholar 

  9. Damiani, E., Vimercati, S.D.C.D., Paraboschi, S., Samarati, P.: A Fine-Grained Access Control System for XML Documents. ACM Transaction on Information and System Security 5(2), 169–202 (2001)

    Article  Google Scholar 

  10. Miklau, G., Suciu, D.: Controlling Access to Published Data using Cryptography. In: VLDB (2003)

    Google Scholar 

  11. Brodskyand, A., Farkas, C., Jajodia, S.: Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures. TKDE 12(6), 900–919 (2000)

    Google Scholar 

  12. Bertino, E., Carminati, B., Ferrari, E.: A Secure Publishing Service for Digital Libraries of XML Documents. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 347–362. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  13. Li, C., Shirani-Mehr, H., Yang, X.: Protecting Individual Information Against Inference Attacks in Data Publishing. UCI Technical Report (2006)

    Google Scholar 

  14. Rajagopalan, S., Vazirani, V.V.: Primal-dual RNC approximation algorithms for set cover and covering integer programs. SIAM Journal on Computing 28(2), 525–540 (1999)

    Article  MathSciNet  Google Scholar 

  15. Graham, R.L., Knuth, D.E., Patashnik, O.: Concrete mathematics: a foundation for computer science. Addison-Wesley Longman, Reading (1989)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ramamohanarao Kotagiri P. Radha Krishna Mukesh Mohania Ekawit Nantajeewarawat

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, C., Shirani-Mehr, H., Yang, X. (2007). Protecting Individual Information Against Inference Attacks in Data Publishing. In: Kotagiri, R., Krishna, P.R., Mohania, M., Nantajeewarawat, E. (eds) Advances in Databases: Concepts, Systems and Applications. DASFAA 2007. Lecture Notes in Computer Science, vol 4443. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71703-4_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71703-4_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71702-7

  • Online ISBN: 978-3-540-71703-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics