Exact and heuristic methods for cell suppression in multi-dimensional linked tables

The increasing demand for information, coupled with the increasing capability of computer systems, has compelled information providers to reassess their procedures for preventing disclosure of confidential information. This paper considers the problem of protecting an unpublished, sensitive table by suppressing cells in related, published tables. A conventional integer programming technique for two-dimensional tables is extended to find an optimal suppression set for the public tables. This can be used to protect the confidentiality of sensitive data in three- and higher-dimensional tables. More importantly, heuristics that are intimately related to the structure of the problem are also presented to mitigate the computational difficulty of the integer program. An example is drawn from healthcare management. Data tables are randomly generated to assess the computational time/space restrictions of the IP model, and to evaluate the heuristics.

[1]  Ivan P. Fellegi,et al.  On the Question of Statistical Confidentiality , 1972 .

[2]  Thomas L. Magnanti,et al.  Applied Mathematical Programming , 1977 .

[3]  L. Cox Suppression Methodology and Statistical Disclosure Control , 1980 .

[4]  B. Causey,et al.  Applications of Transportation Theory to Statistical Problems , 1985 .

[5]  L. Cox A Constructive Procedure for Unbiased Controlled Rounding , 1987 .

[6]  Robin Lougee-Heimer Guarantying Confidentiality the Protection of Tabular Data , 1989 .

[7]  D. Lambert,et al.  The Risk of Disclosure for Microdata , 1989 .

[8]  James P. Kelly,et al.  Using Simulated Annealing to Solve Controlled Rounding Problems , 1990, INFORMS J. Comput..

[9]  James P. Kelly,et al.  Controlled Rounding of Tabular Data , 1990, Oper. Res..

[10]  George T. Duncan,et al.  Microdata disclosure limitation in statistical databases: query size and random sample query control , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[11]  James P. Kelly,et al.  Cell suppression: Disclosure protection for sensitive tabular data , 1992, Networks.

[12]  Laura Zayatz USING LINEAR PROGRAMMING METHODOLOGY FOR DISCLOSURE AVOIDANCE PURPOSES , 1992 .

[13]  N. Dellaert,et al.  Statistical Disclosure in Two-Dimensional Tables: General Tables , 1994 .

[14]  Dinesh Batra,et al.  Accessibility, security, and accuracy in statistical databases: the case for the multiplicative fixed data perturbation approach , 1995 .

[15]  Lawrence H. Cox,et al.  Network Models for Complementary Cell Suppression , 1995 .

[16]  Ton de Waal,et al.  Statistical Disclosure Control in Practice , 1996 .

[17]  George T. Duncan,et al.  Obtaining Information while Preserving Privacy: A Markov Perturbation Method for Tabular Data , 1997 .

[18]  Laura Voshell Zayatz,et al.  Using noise for disclosure limi-tation of establishment tabular data , 1998 .

[19]  Paulo B. Góes,et al.  Interval Protection of Confidential Information in a Database , 1998, INFORMS J. Comput..

[20]  Ramayya Krishnan,et al.  Inference of three-way table entries from two-dimensional projections , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.

[21]  Ramayya Krishnan,et al.  Disclosure Detection in Multivariate Categorical Databases: Auditing Confidentiality Protection Through Two New Matrix Operators , 1999 .

[22]  M. Fischetti,et al.  Models and Algorithms for Optimizing Cell Suppression in Tabular Data with Linear Constraints , 2000 .

[23]  S E Fienberg,et al.  INAUGURAL ARTICLE by a Recently Elected Academy Member:Bounds for cell entries in contingency tables given marginal totals and decomposable graphs , 2000 .

[24]  George T. Duncan,et al.  Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive Noise , 2000 .

[25]  L. Zayatz,et al.  A NETWORK FLOW DISCLOSURE AVOIDANCE SYSTEM APPLIED TO THE CENSUS OF AGRICULTURE , 2002 .

[26]  C. Sullivan,et al.  A Data Structure and Integer Programming Technique to Facilitate Cell Suppression Strategies , 2002 .

[27]  Gabriela Schütz,et al.  Cell suppression problem: A genetic-based approach , 2008, Comput. Oper. Res..

[28]  Alistair R. Clark,et al.  A Genetic Approach to Statistical Disclosure Control , 2012, IEEE Transactions on Evolutionary Computation.