Privacy-preserving data integration and sharing
Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
Hi-index | 0.00 |
As computer databases have become more prevalent and comprehensive, they have prompted concerns about the confidentiality of sensitive information. Database administrators require effective policies to guard against disclosure of confidential information while at the same time providing reasonable access to legitimate users. A general method is available for determining if disclosure of sensitive information may result from inference over multiple database tables. This method relies on the logical structure of the tables, and is thus independent of the actual contents. After reviewing this method, we present new numerical techniques which in some cases allow inference of sensitive data even in instances pronounced safe by the logical method. These new techniques exploit the contents of the tables, and one makes use of a pair of new matrix operators. A real-world example of a multi-table inference process is given.