Remote access systems for statistical analysis of microdata

Statistical Agencies manage huge amounts of microdata. The main task of these agencies is to provide a variety of users with general information about for instance the population and the economy. However, in some cases users request additional, more specific information. Many agencies have therefore set up facilities that enable selected users to obtain tailor-made statistical information.A remote access system is an example of such a facility where users can submit queries for statistical information from their own computer. These queries are handled by the statistical agency and the generated, possibly confidentialised, output is returned to the user. This way the agency still keeps control over its own data while the user does not need to make frequent visits to the agency.For some years, the Luxembourg Income Study (LIS) and Luxembourg Employment Study (LES) have made use of an advanced remote access system. At Statistics Netherlands and at other statistical institutes recently the need for a similar system has been expressed. In this article, we discuss the characteristics, limitations and desired properties of a remote access system. We illustrate the discussion by the system used at LIS/LES.

[1]  Nabil R. Adam,et al.  Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..

[2]  Gultekin Özsoyoglu,et al.  On Inference Control in Semantic Data Models for Statistical Databases , 1990, J. Comput. Syst. Sci..

[3]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[4]  Gultekin Özsoyoglu,et al.  Statistical database design , 1981, TODS.

[5]  P. Doyle,et al.  Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies , 2001 .

[6]  P. J. Lees,et al.  Remote access to medical records via the Internet: feasibility, security and multilingual considerations , 1999, Computers in Cardiology 1999. Vol.26 (Cat. No.99CH37004).

[7]  Francis Y. L. Chin,et al.  Efficient Inference Control for Range SUM Queries , 1984, Theor. Comput. Sci..

[8]  William DuMouchel,et al.  A Fast Computer Intrusion Detection Algorithm Based on Hypothesis Testing of Command Transition Probabilities , 1998, KDD.

[9]  George T. Duncan,et al.  Enhancing Access to Microdata while Protecting Confidentiality: Prospects for the Future , 1991 .

[10]  Mark Elliot,et al.  Scenarios of attack: the data intruder's perspective on statistical disclosure risk , 1999 .

[11]  L. Willenborg,et al.  Elements of Statistical Disclosure Control , 2000 .

[12]  George T. Duncan,et al.  Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive Noise , 2000 .

[13]  Risto Miikkulainen,et al.  Intrusion Detection with Neural Networks , 1997, NIPS.

[14]  Stephen E. Fienberg,et al.  Software Systems for Tabular Data Releases , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[15]  J. Schlörer Confidentiality of Statistical Records: A Threat-Monitoring Scheme for On Line Dialogue , 1976, Methods of Information in Medicine.

[16]  Marc Cigrang,et al.  Balancing Data Access and Data Protection: The Luxembourg Income Study Experience , 1990 .

[17]  A. Hout,et al.  Randomized Response, Statistical Disclosure Control and Misclassificatio: a Review , 2002 .

[18]  Jerome P. Reiter,et al.  Model Diagnostics for Remote Access Regression Servers , 2003, Stat. Comput..

[19]  Ton de Waal,et al.  Statistical Disclosure Control in Practice , 1996 .

[20]  Shiuh-Pyng Shieh,et al.  Auditing User Queries in Dynamic Statistical Databases , 1999, Inf. Sci..

[21]  L. Rainwater,et al.  The Luxembourg Income Study: The Use of International Telecommunications in Comparative Social Research , 1988 .

[22]  Xiaoyang Sean Wang,et al.  Information technology implementation for a distributed data system serving Earth scientists: seasonal to interannual ESIP , 1998, Proceedings. Tenth International Conference on Scientific and Statistical Database Management (Cat. No.98TB100243).