Security problems on inference control for SUM, MAX, and MIN queries
Journal of the ACM (JACM)
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Random Structures & Algorithms
Secure databases: protection against user influence
ACM Transactions on Database Systems (TODS)
PODS '00 Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
A Multi-Set Extended Relational Algebra - A Formal Approach to a Practical Issue
Proceedings of the Tenth International Conference on Data Engineering
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
A formal analysis of information disclosure in data exchange
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
On the complexity of optimal K-anonymity
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Incognito: efficient full-domain K-anonymity
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Personalized privacy preservation
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Information disclosure under realistic assumptions: privacy versus optimality
Proceedings of the 14th ACM conference on Computer and communications security
Toward privacy in public databases
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Theoretical Computer Science
Hi-index | 0.00 |
Studied in this paper is the problem of restoring compromised privacy for micro-data disclosure with multiple disclosed views. The property of γ-privacy is proposed, which requires that the probability of an individual to be associated with a sensitive value must be bounded by γ in a possible table which is randomly selected from a set of tables that would lead the same disclosed answers. For the restricted case of a single disclosed view, the γ-privacy is shown to be equivalent to recursive ([EQUATION], 2)-Diversity, which is not defined for multiple disclosed views. The problem of deciding on γ-privacy for a set of disclosed views is proven to be #P-complete. To mitigate the high computational complexity, the property of γ-privacy is relaxed to be satisfied with (ε, θ) confidence, i.e., that the probability of disclosing a sensitive value of an individual must be bounded by γ + ε with statistical confidence θ. A Monte Carlo-based algorithm is proposed to check the relaxed property in O((λλ')4) time for constant ε and θ, where λ is the number of tuples in the original table and λ' is the number different sensitive values in the original table. Restoring compromised privacy using additional disclosed views is studied. Heuristic polynomial time algorithms are proposed based on enumerating and checking additional disclosed views. A preliminary experimental study is conducted on real-life medical data, which demonstrates that the proposed polynomial algorithms restore privacy in up to 60% of compromised disclosures.