Inference control via query restriction vs. data modification: a perspective
on Database Security: Status and Prospects
Applied multivariate statistical analysis
Applied multivariate statistical analysis
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Compromising statistical databases responding to queries about means
ACM Transactions on Database Systems (TODS)
The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
Security of statistical databases: multidimensional transformation
ACM Transactions on Database Systems (TODS)
The statistical security of a statistical database
ACM Transactions on Database Systems (TODS)
Cryptography and data security
Cryptography and data security
Selective partial access to a database
ACM '76 Proceedings of the 1976 annual conference
Bias avoidance and measures of confidentiality for the noise addition method of database disclosure control
Journal of the ACM (JACM)
Security of random data perturbation methods
ACM Transactions on Database Systems (TODS)
Microdata Protection through Noise Addition
Inference Control in Statistical Databases, From Theory to Practice
Disclosure Risk Assessment in Perturbative Microdata Protection
Inference Control in Statistical Databases, From Theory to Practice
RANDOM '98 Proceedings of the Second International Workshop on Randomization and Approximation Techniques in Computer Science
Information Sciences—Informatics and Computer Science: An International Journal
A theoretical basis for perturbation methods
Statistics and Computing
Disclosure risk measures for the sampling disclosure control method
Proceedings of the 2004 ACM symposium on Applied computing
A framework for privacy preserving classification in data mining
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Assessing global disclosure risk in masked microdata
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
On tracker attacks in health grids
Proceedings of the 2006 ACM symposium on Applied computing
On-line data protecting via pseudo random binary sequences
CEA'07 Proceedings of the 2007 annual Conference on International Conference on Computer Engineering and Applications
Preventing interval-based inference by random data perturbation
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Measurement error and statistical disclosure control
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
Protecting data privacy through hard-to-reverse negative databases
ISC'06 Proceedings of the 9th international conference on Information Security
On deducibility and anonymisation in medical databases
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Combinations of SDC methods for microdata protection
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Hi-index | 0.01 |
The random data perturbation (RDP) method of preserving the privacy of individual records in a statistical database is discussed. In particular, it is shown that if confidential attributes are allowed as query-defining variables, severe biases may result in responses to queries. It is also shown that even if query definition through confidential variables is not allowed, biases can still occur in responses to queries such as those involving proportions or counts. In either case, serious distortions may occur in user statistical analyses. A modified version of RDP is presented, in the form of a query adjustment procedure and specialized perturbation structure which will produce unbiased results.