Probabilistic Inference Channel Detection and Restriction Applied to Patients' Privacy Assurance

Traditional access control models protect sensitive data from unauthorised direct accesses; however, they fail to prevent indirect inferences. Information disclosure via inference channels occurs when secret information is derived from unclassified non-secure information and other sources like metadata and public observations. Previously, techniques using precise and fuzzy functional dependencies were proposed to detect inference channels. However, such methods are inappropriate when probabilistic relationships exist among data items that may be used to infer information with a predictable likelihood of accuracy. In this paper, the authors present definitions and algorithms for detecting inference channels in a probabilistic knowledge base and maximising an attacker's uncertainty by restricting selected inference channels to comply with data confidentiality and privacy requirements. As an illustration, a healthcare scenario is used to show how inference control can be performed on probabilistic relations to address patients' privacy concerns over Electronic Medical Records. To limit an attacker's ability to know secret data selected inference channels are restricted by using a Bayesian network that incorporates the information stored within a medical knowledge base to decide which facts must be hidden to limit undesired inferences.

[1]  Joachim Biskup,et al.  Lying versus refusal for known potential secrets , 2001, Data Knowl. Eng..

[2]  Gultekin Özsoyoglu,et al.  Controlling FD and MVD Inferences in Multilevel Relational Database Systems , 1991, IEEE Trans. Knowl. Data Eng..

[3]  L. Janczewski Internet and Intranet Security Management: Risks and Solutions , 1999 .

[4]  J. Pearl Statistics and causal inference: A review , 2003 .

[5]  Thomas S. Huang,et al.  Digital Rights Management for E-Content and E-Technologies , 2006 .

[6]  Thomas L. Griffiths,et al.  Technical Introduction: A primer on probabilistic inference , 2005 .

[7]  Reind P. van de Riet,et al.  Answering queries without revealing secrets , 1983, TODS.

[8]  Joachim Biskup,et al.  Confidentiality Policies and Their Enforcement for Controlled Query Evaluation , 2002, ESORICS.

[9]  Elisa Bertino,et al.  Database security - concepts, approaches, and challenges , 2005, IEEE Transactions on Dependable and Secure Computing.

[10]  Hamid R. Nemati,et al.  Information Security and Ethics: Concepts, Methodologies, Tools and Applications , 2008 .

[11]  Ira S. Moskowitz,et al.  An Integrated Framework for Database Privacy Protection , 2000, DBSec.

[12]  Judea Pearl,et al.  Bayesian Networks , 1998, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[13]  Michael Weiss,et al.  Modelling Security Patterns Using NFR Analysis , 2007 .

[14]  Yan Hongqiao,et al.  Electronic Medical Records vs. Electronic Health Records:Yes,There Is a Difference , 2007 .

[15]  David Heckerman,et al.  A Tractable Inference Algorithm for Diagnosing Multiple Diseases , 2013, UAI.

[16]  Joachim Biskup,et al.  Controlled query evaluation with open queries for a decidable relational submodel , 2007, Annals of Mathematics and Artificial Intelligence.

[17]  Leoan J. Buczkowski Database Inference Controller , 1989, Database Security.

[18]  Sushil Jajodia,et al.  Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures , 2000, IEEE Trans. Knowl. Data Eng..

[19]  David B Allison,et al.  Divergence in popular diets relative to diets consumed by Americans, and implications for diet selection. , 2007, MedGenMed : Medscape general medicine.

[20]  Joachim Biskup,et al.  Controlled Query Evaluation for Known Policies by Combining Lying and Refusal , 2004, Annals of Mathematics and Artificial Intelligence.

[21]  Sujeet Shenoi,et al.  Catalytic inference analysis: detecting inference threats due to knowledge discovery , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[22]  Thomas L. Griffiths,et al.  Technical Introduction: A primer on probabilistic inference - eScholarship , 2006 .

[23]  Robert H Eikelboom,et al.  Clinical decision support systems and computer-aided diagnosis in otology , 2007, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.

[24]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[25]  Sushil Jajodia,et al.  The inference problem: a survey , 2002, SKDD.

[26]  Nick Cercone,et al.  Auditing and Inference Control for Privacy Preservation in Uncertain Environments , 2006, EuroSSC.

[27]  Hamid R. Nemati International Journal of Information Security and Privacy , 2007 .