Secure and useful data sharing

Data sharing among organizations, both government and business, has increased with the advent of the Internet. The study is motivated by the need to address increased confidentiality and privacy concerns that arise with the use of the Internet, while realizing the benefits of data sharing. In this study, we develop a research issues framework based on a survey of existing literature. The framework is used to identify OR/MS research opportunities in disclosure prevention, record-linkage, and in the assessment of the impact of data sharing. Addressing these issues could enable organizations to securely share data.

[1]  Hau L. Lee,et al.  Information sharing in a supply chain , 2000, Int. J. Manuf. Technol. Manag..

[2]  Dorothy E. Denning,et al.  Inference Controls for Statistical Databases , 1983, Computer.

[3]  Stephen E. Fienberg,et al.  Disclosure limitation using perturbation and related methods for categorical data , 1998 .

[4]  Seungjin Whang,et al.  Supply Chain Integration Over the Internet , 2002 .

[5]  P. Ivax,et al.  A THEORY FOR RECORD LINKAGE , 2004 .

[6]  Ramayya Krishnan,et al.  Special Issue: OR/MS and E-Business: Prospects for Operations Research in the E-Business Era , 2001, Interfaces.

[7]  William E. Winkler,et al.  Advanced Methods For Record Linkage , 1994 .

[8]  Gérard P. Cachon,et al.  Contracting to Assure Supply: How to Share Demand Forecasts in a Supply Chain , 2001, Manag. Sci..

[9]  William E. Winkler Record Linkage Software and Methods for Merging Administrative Lists , 2001 .

[10]  Nabil R. Adam,et al.  Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..

[11]  George T. Duncan,et al.  Disclosure-Limited Data Dissemination , 1986 .

[12]  Jeffrey S. Simonoff,et al.  The use of regression methodology for the compromise of confidential information in statistical databases , 1987, TODS.

[13]  William E. Winkler,et al.  The State of Record Linkage and Current Research Problems , 1999 .

[14]  L. Willenborg,et al.  Elements of Statistical Disclosure Control , 2000 .

[15]  George T. Duncan,et al.  Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive Noise , 2000 .

[16]  Paulo B. Góes,et al.  Interval Protection of Confidential Information in a Database , 1998, INFORMS J. Comput..

[17]  Sumitra Mukherjee,et al.  A Polynomial Algorithm for Optimal Univariate Microaggregation , 2003, IEEE Trans. Knowl. Data Eng..

[18]  George T. Duncan,et al.  Enhancing Access to Microdata while Protecting Confidentiality: Prospects for the Future , 1991 .

[19]  Christopher S. Tang,et al.  The Value of Information Sharing in a Two-Level Supply Chain , 2000 .

[20]  Rathindra Sarathy,et al.  Perturbing Nonnormal Confidential Attributes: The Copula Approach , 2002, Manag. Sci..

[21]  Josep Domingo-Ferrer,et al.  Inference Control in Statistical Databases , 2002, Lecture Notes in Computer Science.

[22]  L. Cox Statistical Disclosure Limitation , 2006 .

[23]  Sumit Sarkar,et al.  A Probabilistic Decision Model for Entity Matching in Heterogeneous Databases , 1998 .

[24]  Marshall L. Fisher,et al.  Supply Chain Inventory Management and the Value of Shared Information , 2000 .

[25]  Gultekin Özsoyoglu,et al.  Auditing and Inference Control in Statistical Databases , 1982, IEEE Transactions on Software Engineering.

[26]  G. Salton,et al.  Measuring success. , 2008, Canadian family physician Medecin de famille canadien.

[27]  Stephen E. Fienberg,et al.  Confidentiality and Data Protection Through Disclosure Limitation: Evolving Principles and Technical Advances , 2000 .

[28]  R. Kapuściński,et al.  Value of Information in Capacitated Supply Chains , 1999 .

[29]  Joseph B. Kadane Some Statistical Problems in Merging Data Files , 2001 .

[30]  Paul H. Zipkin,et al.  Competitive and Cooperative Inventory Policies in a Two-Stage Supply Chain , 1999 .

[31]  Ramayya Krishnan,et al.  Disclosure Detection in Multivariate Categorical Databases: Auditing Confidentiality Protection Through Two New Matrix Operators , 1999 .

[32]  Rathindra Sarathy,et al.  The Security of Confidential Numerical Data in Databases , 2002, Inf. Syst. Res..

[33]  James P. Kelly,et al.  Controlled Rounding of Tabular Data , 1990, Oper. Res..

[34]  Paulo B. Góes,et al.  Confidentiality via Camouflage: The CVC Approach to Disclosure Limitation When Answering Queries to Databases , 2002, Oper. Res..

[35]  Paulo B. Góes,et al.  Privacy Protection of Binary Confidential Data Against Deterministic, Stochastic, and Insider Threat , 2002, Manag. Sci..

[36]  Jeff Smith,et al.  Privacy policies and practices: inside the organizational maze , 1993, CACM.

[37]  Rathindra Sarathy,et al.  A General Additive Data Perturbation Method for Database Security , 1999 .

[38]  Debabrata Dey,et al.  Record Matching in Data Warehouses: A Decision Model for Data Consolidation , 2003, Oper. Res..