Skip to main content

Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases

  • Conference paper
Trust, Privacy and Security in Digital Business (TrustBus 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7449))

Abstract

In this paper, we define a novel setting for query auditing, where instead of detecting or preventing the disclosure of individual sensitive values, we want to detect or prevent the disclosure of aggregate values in the database. More specifically, we study the problem of detecting or preventing the disclosure of the maximum (minimum) value in the database, when the querier is allowed to issue average queries to the database. We propose efficient off-line and on-line query auditors for this problem in the full disclosure model, and an efficient simulatable on-line query auditor in the partial disclosure model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aggarwal, C.C., Yu, P.S. (eds.): Privacy-Preserving Data Mining - Models and Algorithms. Advances in Database Systems, vol.Ā 34. Springer (2008)

    Google ScholarĀ 

  2. Chen, Y., Evans, D.: Auditing information leakage for distance metrics. In: 3rd IEEE International Conference on Privacy, Security, Risk and Trust, pp. 1131ā€“1140. IEEE (2011)

    Google ScholarĀ 

  3. Chin, F.: Security problems on inference control for sum, max, and min queries. J. ACMĀ 33, 451ā€“464 (1986)

    ArticleĀ  MathSciNetĀ  Google ScholarĀ 

  4. Chin, F., Ozsoyoglu, G.: Auditing for secure statistical databases. In: Proceedings of the ACM 1981 Conference, New York, USA, pp. 53ā€“59 (1981)

    Google ScholarĀ 

  5. Kenthapadi, K.: Models and algorithms for data privacy. Ph.D. Thesis, Computer Science Department, Stanford University (2006)

    Google ScholarĀ 

  6. Kenthapadi, K., Mishra, N., Nissim, K.: Simulatable auditing. In: 25th Symposium on Principles of Database Systems (PODS), pp. 118ā€“127 (2005)

    Google ScholarĀ 

  7. Kleinberg, J., Papadimitriou, C., Raghavan, P.: Auditing boolean attributes. Journal of Computer and System Sciences, 86ā€“91 (2000)

    Google ScholarĀ 

  8. Zhang, L., Jajodia, S., Brodsky, A.: Simulatable Binding: Beyond Simulatable Auditing. In: Jonker, W., Petković, M. (eds.) SDM 2008. LNCS, vol.Ā 5159, pp. 16ā€“31. Springer, Heidelberg (2008)

    ChapterĀ  Google ScholarĀ 

  9. LovĆ”sz, L., Vempala, S.: The geometry of logconcave functions and sampling algorithms. Journal Random Struct. AlgorithmsĀ 30, 307ā€“358 (2007)

    ArticleĀ  MATHĀ  Google ScholarĀ 

  10. Nabar, S.U., Marthi, B., Kenthapadi, K., Mishra, N., Motwani, R.: Towards robustness in query auditing. In: Proceedings of the 5th VLDB Workshop on Secure Data Management, pp. 151ā€“162 (2006)

    Google ScholarĀ 

  11. Nabar, S.U., Marthi, B., Kenthapadi, K., Mishra, N., Motwani, R.: Towards robustness in query auditing. Technical Report, Stanford University (2006)

    Google ScholarĀ 

  12. Renegar, J.: A polynomial-time algorithm, based on Newtonā€™s method, for linear programming, 1st edn. Mathematical Sciences Research Institute, Berkeley (1986)

    Google ScholarĀ 

  13. Thong, T.V., ButtyƔn, L.: Query auditing for protecting max/min values of sensitive attributes in statistical databases (2012), http://www.crysys.hu/members/tvthong/QA/ThB12QATech.pdf

  14. Li, Y., Wang, L., Sean Wang, X., Jajodia, S.: Auditing Interval-Based Inference. In: Pidduck, A.B., Mylopoulos, J., Woo, C.C., Ozsu, M.T. (eds.) CAiSE 2002. LNCS, vol.Ā 2348, pp. 553ā€“567. Springer, Heidelberg (2002)

    ChapterĀ  Google ScholarĀ 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Thong, T.V., ButtyĆ”n, L. (2012). Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases. In: Fischer-HĆ¼bner, S., Katsikas, S., Quirchmayr, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2012. Lecture Notes in Computer Science, vol 7449. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32287-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32287-7_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32286-0

  • Online ISBN: 978-3-642-32287-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics