An OBDD approach to enforce confidentiality and visibility constraints in data publishing

  • Authors:
  • Valentina Ciriani;Sabrina De Capitani di Vimercati;Sara Foresti;Giovanni Livraga;Pierangela Samarati

  • Affiliations:
  • DTI, Università degli Studi di Milano, Crema, Italy. E-mails: {valentina.ciriani, sabrina.decapitani, sara.foresti, giovanni.livraga, pierangela.samarati}@unimi.it;DTI, Università degli Studi di Milano, Crema, Italy. E-mails: {valentina.ciriani, sabrina.decapitani, sara.foresti, giovanni.livraga, pierangela.samarati}@unimi.it;DTI, Università degli Studi di Milano, Crema, Italy. E-mails: {valentina.ciriani, sabrina.decapitani, sara.foresti, giovanni.livraga, pierangela.samarati}@unimi.it;DTI, Università degli Studi di Milano, Crema, Italy. E-mails: {valentina.ciriani, sabrina.decapitani, sara.foresti, giovanni.livraga, pierangela.samarati}@unimi.it;DTI, Università degli Studi di Milano, Crema, Italy. E-mails: {valentina.ciriani, sabrina.decapitani, sara.foresti, giovanni.livraga, pierangela.samarati}@unimi.it

  • Venue:
  • Journal of Computer Security - DBSec 2011
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

With the growing needs for data sharing and dissemination, privacy-preserving data publishing is becoming an important issue that still requires further investigation. In this paper, we make a step towards private data publication by proposing a solution based on the release of vertical views fragments over a relational table that satisfy confidentiality and visibility constraints expressing requirements for information protection and release, respectively. We translate the problem of computing a fragmentation composed of the minimum number of fragments into the problem of computing a maximum weighted clique over a fragmentation graph. The fragmentation graph models fragments, efficiently computed using Ordered Binary Decision Diagrams OBDDs, that satisfy all the confidentiality constraints and a subset of the visibility constraints defined in the system. We then show an exact and a heuristic algorithm for computing a minimal and a locally minimal fragmentation, respectively. Finally, we provide experimental results comparing the execution time and the fragmentations returned by the exact and heuristic algorithms. The experiments show that the heuristic algorithm has low computation cost and computes a fragmentation close to optimum.