Coding and information theory (2nd ed.)
Coding and information theory (2nd ed.)
The art of computer programming, volume 1 (3rd ed.): fundamental algorithms
The art of computer programming, volume 1 (3rd ed.): fundamental algorithms
Secure databases: protection against user influence
ACM Transactions on Database Systems (TODS)
The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
A security machanism for statistical database
ACM Transactions on Database Systems (TODS)
Security of statistical databases: multidimensional transformation
ACM Transactions on Database Systems (TODS)
Principles of Database Systems
Principles of Database Systems
Selective partial access to a database
ACM '76 Proceedings of the 1976 annual conference
ACM Transactions on Database Systems (TODS)
Further results on the security of partitioned dynamic statistical databases
ACM Transactions on Database Systems (TODS)
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
A modified random perturbation method for database security
ACM Transactions on Database Systems (TODS)
Hybrid inferential security methods for statistical databases
ACM SIGAPP Applied Computing Review - Special issue on security
Security of random data perturbation methods
ACM Transactions on Database Systems (TODS)
PODS '00 Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Auditing Interval-Based Inference
CAiSE '02 Proceedings of the 14th International Conference on Advanced Information Systems Engineering
Cardinality-Based Inference Control in Sum-Only Data Cubes
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Revealing information while preserving privacy
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Journal of Computer and System Sciences - Special issue on PODS 2000
A theoretical basis for perturbation methods
Statistics and Computing
On the Privacy Preserving Properties of Random Data Perturbation Techniques
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Proceedings of the 11th ACM conference on Computer and communications security
Random-data perturbation techniques and privacy-preserving data mining
Knowledge and Information Systems
Privacy-enhancing k-anonymization of customer data
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
To do or not to do: the dilemma of disclosing anonymized data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Cardinality-based inference control in data cubes
Journal of Computer Security
A general model for the answer-perturbation techniques
SSDBM'1994 Proceedings of the 7th international conference on Scientific and Statistical Database Management
A Tree-Based Data Perturbation Approach for Privacy-Preserving Data Mining
IEEE Transactions on Knowledge and Data Engineering
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
TFRP: An efficient microaggregation algorithm for statistical disclosure control
Journal of Systems and Software
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
A privacy-preserving index for range queries
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
On-line data protecting via pseudo random binary sequences
CEA'07 Proceedings of the 2007 annual Conference on International Conference on Computer Engineering and Applications
Parity-based inference control for multi-dimensional range sum queries
Journal of Computer Security
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Dynamic inference control in privacy preference enforcement
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
An efficient online auditing approach to limit private data disclosure
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Privately detecting bursts in streaming, distributed time series data
Data & Knowledge Engineering
On Distributed k-Anonymization
Fundamenta Informaticae
A Bayesian model for disclosure control in statistical databases
Data & Knowledge Engineering
Auditing user queries in dynamic statistical databases
Information Sciences: an International Journal
A cubic-wise balance approach for privacy preservation in data cubes
Information Sciences: an International Journal
Preventing interval-based inference by random data perturbation
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
New paradigm of inference control with trusted computing
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
ACM Transactions on Database Systems (TODS)
Protecting Privacy Against Record Linkage Disclosure: A Bounded Swapping Approach for Numeric Data
Information Systems Research
Temporal context lie detection and generation
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Secure anonymization for incremental datasets
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Auditing and inference control for privacy preservation in uncertain environments
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
Disclosure analysis for two-way contingency tables
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
On Distributed k-Anonymization
Fundamenta Informaticae
Developing privacy solutions for sharing and analysing healthcare data
International Journal of Business Information Systems
Hi-index | 0.00 |
This note proposes a statistical perturbation scheme to protect a statistical database against compromise. The proposed scheme can handle the security of numerical as well as nonnumerical sensitive fields. Furthermore, knowledge of some records in a database does not help to compromise unknown records. We use Chebyshev's inequality to analyze the trade-offs among the magnitude of the perturbations, the error incurred by statistical queries, and the size of the query set to which they apply. We show that if the statistician is given absolute error guarantees, then a compromise is possible, but the cost is made exponential in the size of the database.