Reasoning under uncertainty and multi-criteria decision making in data privacy

By means of an integration of decision theory and probabilistic models, we explore and develop methods for improving data privacy. Our work encompasses disclosure control tools in statistical databases and privacy requirements prioritization; in particular we propose a Bayesian approach for the on-line auditing in Statistical Databases and Pairwise Comparison Matrices for privacy requirements prioritization. The first approach is illustrated by means of examples in the context of statistical analysis on the census and medical data, where no salary (resp. no medical information), that could be related to a specific employee (resp. patient), must be released; the second approach is illustrated by means of examples, such as an e-voting system and an e-banking service that have to satisfy privacy requirements in addition to functional and security ones. Several fields in the social sciences, economics and engineering will benefit from the advances in this research area: e-voting, e-government, e-commerce, e-banking, e-health, cloud computing and risk management are a few examples of applications for the findings of this research.

[1]  Gerardo Canfora,et al.  A Bayesian Approach for On-Line Sum/Count/Max/Min Auditing on Boolean Data , 2012, Privacy in Statistical Databases.

[2]  Cynthia Dwork,et al.  Practical privacy: the SuLQ framework , 2005, PODS.

[3]  Bice Cavallo,et al.  Transitive pairwise comparison matrices over abelian linearly ordered groups , 2009 .

[4]  Nancy R. Mead,et al.  Adapting the SQUARE Process for Privacy Requirements Engineering , 2010 .

[5]  Sampath Srinivas,et al.  A Generalization of the Noisy-Or Model , 1993, UAI.

[6]  Massimo Squillante,et al.  About a consistency index for pairwise comparison matrices over a divisible alo‐group , 2012, Int. J. Intell. Syst..

[7]  Judea Pearl,et al.  Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.

[8]  Gerardo Canfora,et al.  A Bayesian model for disclosure control in statistical databases , 2009, Data Knowl. Eng..

[9]  Massimo Squillante,et al.  Building Consistent Pairwise Comparison Matrices over Abelian Linearly Ordered Groups , 2009, ADT.

[10]  Francis Y. L. Chin,et al.  Security problems on inference control for SUM, MAX, and MIN queries , 1986, JACM.

[11]  Rajeev Motwani,et al.  Towards robustness in query auditing , 2006, VLDB.

[12]  Bice Cavallo,et al.  Investigating Properties of the ⊙-Consistency Index , 2012, IPMU.

[13]  T. L. Saaty A Scaling Method for Priorities in Hierarchical Structures , 1977 .

[14]  Gerardo Canfora,et al.  Reasoning under Uncertainty in On-Line Auditing , 2008, Privacy in Statistical Databases.

[15]  Thomas L. Saaty,et al.  DECISION MAKING WITH THE ANALYTIC HIERARCHY PROCESS , 2008 .

[16]  Thomas L. Saaty,et al.  Marketing Applications of the Analytic Hierarchy Process , 1980 .

[17]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[18]  J. Barzilai Consistency Measures for Pairwise Comparison Matrices , 1998 .

[19]  T. Saaty Axiomatic foundation of the analytic hierarchy process , 1986 .

[20]  Henryk Wozniakowski,et al.  The statistical security of a statistical database , 1984, TODS.

[21]  Thomas L. Saaty,et al.  Negotiating the Israeli-Palestinian Controversy from a New Perspective , 2011, Int. J. Inf. Technol. Decis. Mak..

[22]  Steen Andreassen,et al.  A munin network for the median nerve - a case study on loops , 1989, Appl. Artif. Intell..

[23]  Ricardo Viana Vargas USING THE ANALYTIC HIERARCHY PROCESS (AHP) TO SELECT AND PRIORITIZE PROJECTS IN A PORTFOLIO , 2010 .

[24]  Bice Cavallo,et al.  Pairwise Comparison Matrices: Some Issue on Consistency and a New Consistency Index , 2010, Preferences and Decisions.

[25]  Irit Dinur,et al.  Revealing information while preserving privacy , 2003, PODS.

[26]  T. Saaty,et al.  The Analytic Hierarchy Process , 1985 .

[27]  Gerardo Canfora,et al.  A Bayesian approach for on-line max and min auditing , 2008, PAIS '08.

[28]  Bice Cavallo,et al.  Deriving weights from a pairwise comparison matrix over an alo-group , 2011, Soft Computing.

[29]  Marina Moscarini,et al.  Auditing sum-queries to make a statistical database secure , 2006, TSEC.

[30]  Norman S. Matloff Another Look at the Use of Noise Addition for Database Security , 1986, 1986 IEEE Symposium on Security and Privacy.

[31]  Nabil R. Adam,et al.  Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..

[32]  Leland L. Beck,et al.  A security machanism for statistical database , 1980, TODS.

[33]  Peter J. Denning,et al.  The tracker: a threat to statistical database security , 1979, TODS.

[34]  Gerardo Canfora,et al.  A Bayesian Approach for on-Line Max Auditing , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[35]  S L Warner,et al.  Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.

[36]  Richard J. Lipton,et al.  Secure databases: protection against user influence , 1979, TODS.

[37]  L. D'Apuzzo,et al.  A general unified framework for pairwise comparison matrices in multicriterial methods , 2009 .

[38]  Dorothy E. Denning,et al.  Secure statistical databases with random sample queries , 1980, TODS.

[39]  J. Schlörer Identification and Retrieval of Personal Records from a Statistical Data Bank , 1975, Methods of Information in Medicine.

[40]  Gerardo Canfora,et al.  A Bayesian Approach for on-Line Max Auditing , 2008, ARES.

[41]  Thomas L. Saaty,et al.  Decision making for leaders , 1985, IEEE Transactions on Systems, Man, and Cybernetics.

[42]  Bice Cavallo,et al.  Characterizations of consistent pairwise comparison matrices over abelian linearly ordered groups , 2010 .

[43]  Jon M. Kleinberg,et al.  Auditing Boolean attributes , 2003, J. Comput. Syst. Sci..

[44]  Gerardo Canfora,et al.  A Probabilistic Approach for On-Line Sum-Auditing , 2010, 2010 International Conference on Availability, Reliability and Security.

[45]  Livia D'Apuzzo,et al.  Weak Consistency and Quasi-Linear Means Imply the Actual Ranking , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[46]  Ivan P. Fellegi,et al.  On the Question of Statistical Confidentiality , 1972 .

[47]  Nina Mishra,et al.  Simulatable auditing , 2005, PODS.

[48]  David Heckerman,et al.  Causal Independence for Knowledge Acquisition and Inference , 1993, UAI.