The inference problem: Maintaining maximal availability in the presence of database updates

In this paper, we present the Dynamic Disclosure Monitor (D^2Mon) architecture to prevent illegal inferences via database constraints. D^2Mon extends the functionality of Disclosure Monitor (DiMon) to address database updates while preserving the soundness and completeness properties of the inference algorithms. We study updates from the perspective of increasing data availability. That is, updates on tuples that were previously released may affect the correctness of the user inferences over these tuples. We develop a mechanism, called Update Consolidator (UpCon), that propagates updates to a history file to ensure that no query is rejected based on inferences derived from outdated data. The history file is used by the Disclosure Inference Engine (DiIE) to compute inferences. We show that UpCon and DiIE working together guarantee confidentiality (completeness property of the data-dependent disclosure inference algorithm) and maximal availability (soundness property of the data-dependent disclosure inference algorithm) even in the presence of updates. We also present our implementation of D^2Mon and our empirical results.

[1]  Csilla Farkas,et al.  Dynamic Disclosure Monitor (D2Mon): An Improved Query Processing Solution , 2005, Secure Data Management.

[2]  S. Jajodia,et al.  Information Security: An Integrated Collection of Essays , 1994 .

[3]  Karl N. Levitt,et al.  Data level inference detection in database systems , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).

[4]  Bhavani M. Thuraisingham,et al.  Design of LDV: a multilevel secure relational database management system , 1990 .

[5]  Sushil Jajodia,et al.  The inference problem: a survey , 2002, SKDD.

[6]  Harry S. Delugach,et al.  Wizard: A Database Inference Analysis and Detection System , 1996, IEEE Trans. Knowl. Data Eng..

[7]  Bhavani M. Thuraisingham,et al.  Database and Applications Security: Integrating Information Security and Data Management , 2005 .

[8]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[9]  Josep Domingo-Ferrer,et al.  Inference Control in Statistical Databases, From Theory to Practice , 2002 .

[10]  Toru Fujiwara,et al.  Security against Inference Attacks on Negative Information in Object-Oriented Databases , 2002, ICICS.

[11]  Jeffrey D. Ullman,et al.  Principles Of Database And Knowledge-Base Systems , 1979 .

[12]  Sabrina De Capitani di Vimercati,et al.  Specification and enforcement of classification and inference constraints , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[13]  D.G. Marks,et al.  Inference in MLS Database Systems , 1996, IEEE Trans. Knowl. Data Eng..

[14]  Yu Chen,et al.  Protection of Database Security via Collaborative Inference Detection , 2008, IEEE Transactions on Knowledge and Data Engineering.

[15]  Thomas H. Hinke,et al.  Inference aggregation detection in database management systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[16]  Csilla Farkas,et al.  The Inference Problem and Updates in Relational Databases , 2001, DBSec.

[17]  Josep Domingo-Ferrer,et al.  Privacy in Statistical Databases: CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004, Proceedings , 2004 .

[18]  Jeffrey D. Ullman,et al.  Principles of Database and Knowledge-Base Systems, Volume II , 1988, Principles of computer science series.

[19]  Randall P. Wolf,et al.  Protecting databases from inference attacks , 1997, Comput. Secur..

[20]  Josep Domingo-Ferrer,et al.  Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation , 2005, Data Mining and Knowledge Discovery.

[21]  Gary W. Smith,et al.  Modeling security-relevant data semantics , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[22]  Leoan J. Buczkowski Database Inference Controller , 1989, Database Security.

[23]  Sushil Jajodia,et al.  Enhancing the Controlled Disclosure of Sensitive Information , 1996, ESORICS.

[24]  José Meseguer,et al.  Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.

[25]  David W. Stemple,et al.  Resolving the tension between integrity and security using a theorem prover , 1988, SIGMOD '88.

[26]  Josep Domingo-Ferrer,et al.  Privacy in Data Mining , 2005, Data Mining and Knowledge Discovery.

[27]  Jessica Staddon,et al.  Dynamic inference control , 2003, DMKD '03.

[28]  Reind P. van de Riet,et al.  Answering queries without revealing secrets , 1983, TODS.

[29]  Bhavani M. Thuraisingham,et al.  Security checking in relational database management systems augmented with inference engines , 1987, Comput. Secur..

[30]  Sushil Jajodia,et al.  Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures , 2000, IEEE Trans. Knowl. Data Eng..

[31]  Dorothy E. Denning,et al.  Commutative Filters for Reducing Inference Threats in Multilevel Database Systems , 1985, 1985 IEEE Symposium on Security and Privacy.

[32]  Sushil Jajodia,et al.  Inference Problems in Multilevel Secure Database Management Systems , 2006 .

[33]  Bhavani M. Thuraisingham,et al.  Secure query-processing strategies , 1989, Computer.

[34]  L. Willenborg,et al.  Elements of Statistical Disclosure Control , 2000 .

[35]  Gultekin Özsoyoglu,et al.  Controlling FD and MVD Inferences in Multilevel Relational Database Systems , 1991, IEEE Trans. Knowl. Data Eng..

[36]  Matthew Morgenstern,et al.  Controlling logical inference in multilevel database systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[37]  Randall P. Wolf,et al.  A Framework for Inference-Directed Data Mining , 1996, DBSec.

[38]  Joachim Biskup,et al.  Lying versus refusal for known potential secrets , 2001, Data Knowl. Eng..

[39]  Sabrina De Capitani di Vimercati,et al.  Minimal data upgrading to prevent inference and association attacks , 1999, PODS '99.

[40]  David P. Woodruff,et al.  Private inference control , 2004, CCS '04.

[41]  Harry S. Delugach,et al.  A Fast Algorithm for Detecting Second Paths in Database Inference Analysis , 1995, J. Comput. Secur..

[42]  Wesley W. Chu,et al.  Database Security Protection Via Inference Detection , 2006, ISI.