Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases

Considered in this paper are numeric databases, whose instances are vectors in Rn, queries involve their linear transformations, and imprecise query answers are intervals. Introduced for the first time is a security requirement function ρ for a query, to specify the maximum probability ρ(l) that the precise query answer is within any interval of size l. Developed are random disclosure algorithms that satisfy security requirement functions, and guarantee, under certain conditions, maximum data availability.

[1]  Nina Mishra,et al.  Simulatable auditing , 2005, PODS.

[2]  Cynthia Dwork,et al.  Privacy-Preserving Datamining on Vertically Partitioned Databases , 2004, CRYPTO.

[3]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[4]  Alexandre V. Evfimievski,et al.  Privacy preserving mining of association rules , 2002, Inf. Syst..

[5]  Elisa Bertino,et al.  An Extended Authorization Model for Relational Databases , 1997, IEEE Trans. Knowl. Data Eng..

[6]  Yufei Tao,et al.  Personalized privacy preservation , 2006, Privacy-Preserving Data Mining.

[7]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[8]  Sushil Jajodia,et al.  Flexible support for multiple access control policies , 2001, TODS.

[9]  Rakesh Agrawal,et al.  Privacy-preserving data mining , 2000, SIGMOD 2000.

[10]  Matthew Franklin,et al.  Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.

[11]  Duminda Wijesekera,et al.  Constraints, Inference Channels and Secure Databases , 2000, CP.

[12]  D. E. Bell,et al.  Secure Computer Systems : Mathematical Foundations , 2022 .

[13]  Charu C. Aggarwal,et al.  On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.

[14]  David A. Bell,et al.  Secure computer systems: mathematical foundations and model , 1973 .

[15]  Sushil Jajodia,et al.  Auditing Interval-Based Inference , 2002, CAiSE.

[16]  Rina Dechter,et al.  Principles and Practice of Constraint Programming – CP 2000 , 2001, Lecture Notes in Computer Science.

[17]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.

[18]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..