Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Database security
A model of statistical database their security
ACM Transactions on Database Systems (TODS)
Database Systems: A Practical Approach to Design, Implementation, and Management
Database Systems: A Practical Approach to Design, Implementation, and Management
Computational Issues Connected with the Protection of Sensitive Statistics by Auditing Sum Queries
SSDBM '98 Proceedings of the 10th International Conference on Scientific and Statistical Database Management
Journal of Computer and System Sciences - Special issue on PODS 2000
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
An information theoretic approach to statistical databases and their security: a preliminary report
SSDBM'83 Proceedings of the 2nd international workshop on Proceedings of the Second International Workshop on Statistical Database Management
Auditing sum-queries to make a statistical database secure
ACM Transactions on Information and System Security (TISSEC)
Towards robustness in query auditing
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Introduction to Statistical Methods and Data Analysis (with CD-ROM)
Introduction to Statistical Methods and Data Analysis (with CD-ROM)
Security of statistical databases: overview and future directions
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
Auditing and Inference Control in Statistical Databases
IEEE Transactions on Software Engineering
Auditing compliance with a Hippocratic database
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
A Bayesian Approach for on-Line Max Auditing
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
A Bayesian approach for on-line max and min auditing
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Reasoning under Uncertainty in On-Line Auditing
PSD '08 Proceedings of the UNESCO Chair in data privacy international conference on Privacy in Statistical Databases
A Bayesian approach for on-line max auditing of dynamic statistical databases
Proceedings of the 2009 EDBT/ICDT Workshops
Auditing user queries in dynamic statistical databases
Information Sciences: an International Journal
Hi-index | 0.00 |
Statistical databases (SDBs) are used mainly for statistics, and individuals' information should remain secret. Key representation auditing scheme (KRAS) is proposed to guard individuals' confidentiality in online and dynamic SDBs. KRAS converts the original database into key representation database (KRDB) and each new query should be converted into key representation query. Three audit stages are proposed to guarantee the security of SDBs. Also, cost estimation for this scheme is performed, and we illustrate the savings in CPU time and storage space using KRDB. In this paper, we provide statistical analysis for comparison of original database with KRDB to compare between the means/variances of the original database and the KRDB populations. Comparisons are provided in terms of linear search, binary search and sorting. The results of the tests showed that the differences are statistically significant, except in one case, namely the differences between the variances in terms of binary search.