Skip to main content

A Probabilistic Hybrid Logic for Sanitized Information Systems

  • Conference paper
Scalable Uncertainty Management (SUM 2012)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7520))

Included in the following conference series:

  • 1351 Accesses

Abstract

As privacy-preserving data publication has received much attention in recent years, a common technique for protecting privacy is to release the data in a sanitized form. To assess the effect of sanitization methods, several data privacy criteria have been proposed. Different privacy criteria can be employed by a data manager to prevent different attacks, since it is unlikely that a single criterion can meet the challenges posed by all possible attacks. Thus, a natural requirement of data management is to have a flexible language for expressing different privacy constraints. Furthermore, the purpose of data analysis is to discover general knowledge from the data. Hence, we also need a formalism to represent the discovered knowledge. The purpose of the paper is to provide such a formal language based on probabilistic hybrid logic, which is a combination of quantitative uncertainty logic and basic hybrid logic with a satisfaction operator. The main contribution of the work is twofold. On one hand, the logic provides a common ground to express and compare existing privacy criteria. On the other hand, the uniform framework can meet the specification needs of combining new criteria as well as existing ones.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Areces, C., ten Cate, B.: Hybrid logics. In: Blackburn, P., van Benthem, J., Wolter, F. (eds.) Handbook of Modal Logic, pp. 821–868. Elsevier (2007)

    Google Scholar 

  2. Brickell, J., Shmatikov, V.: The cost of privacy: destruction of data-mining utility in anonymized data publishing. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pp. 70–78 (2008)

    Google Scholar 

  3. Domingo-Ferrer, J.: Microdata. In: Liu, L., Tamer Özsu, M. (eds.) Encyclopedia of Database Systems, pp. 1735–1736. Springer, US (2009)

    Google Scholar 

  4. Halpern, J.: Reasoning about Uncertainty. The MIT Press (2003)

    Google Scholar 

  5. Heifetz, A., Mongin, P.: Probability logic for type spaces. Games and Economic Behavior 35(1-2), 31–53 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  6. Hsu, T.-s., Liau, C.-J., Wang, D.-W.: A Logical Model for Privacy Protection. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 110–124. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Larsen, K.G., Skou, A.: Bisimulation through probabilistic testing. Information and Computation 94(1), 1–28 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  8. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: Proc. of the 22nd IEEE International Conference on Data Engineering (ICDE), p. 24 (2006)

    Google Scholar 

  9. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data 1(1) (2007)

    Google Scholar 

  10. Pawlak, Z.: Rough Sets–Theoretical Aspects of Reasoning about Data. Kluwer Academic Publishers (1991)

    Google Scholar 

  11. Samarati, P.: Protecting respondents’ identities in microdata release. IEEE Transactions on Knowledge and Data Engineering 13(6), 1010–1027 (2001)

    Article  Google Scholar 

  12. Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 571–588 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  13. Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  14. Wang, D.-W., Liau, C.-J., Hsu, T.-s.: An epistemic framework for privacy protection in database linking. Data and Knowledge Engineering 61(1), 176–205 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hsu, Ts., Liau, CJ., Wang, DW. (2012). A Probabilistic Hybrid Logic for Sanitized Information Systems. In: Hüllermeier, E., Link, S., Fober, T., Seeger, B. (eds) Scalable Uncertainty Management. SUM 2012. Lecture Notes in Computer Science(), vol 7520. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33362-0_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33362-0_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33361-3

  • Online ISBN: 978-3-642-33362-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics