Discrete algorithms and methods for security of statistical databases related to the work of Mirka Miller

Abstract This article gives a survey of discrete and combinatorial algorithms and methods for database security related to the work of Mirka Miller. The main contributions of Mirka Miller and coauthors to the security of statistical databases include the introduction of Static Audit Expert and theorems determining time complexity of its combinatorial algorithms, a polynomial time algorithm for deciding whether the maximum possible usability can be achieved in a statistical database with a special class of answerable statistics, NP-completeness of similar problems concerning several other types of statistical databases, sharp upper bounds on the number of compromise-free queries in certain categories of statistical databases, and analogous results on applications of Static Audit Expert for the prevention of relative compromise.

[1]  Josep Domingo-Ferrer,et al.  A k-anonymous approach to privacy preserving collaborative filtering , 2015, J. Comput. Syst. Sci..

[2]  Elisa Bertino,et al.  Private Information Retrieval , 2013, Private Information Retrieval.

[3]  Elisa Bertino,et al.  Homomorphic Encryption and Applications , 2014, SpringerBriefs in Computer Science.

[4]  Mirka Miller,et al.  Towards a Practical Auditing Method for the Prevention of Statistical Database Compromise , 1996, Australasian Database Conference.

[5]  Josep Domingo-Ferrer,et al.  New directions in anonymization: Permutation paradigm, verifiability by subjects and intruders, transparency to users , 2015, Inf. Sci..

[6]  Dongxi Liu,et al.  Privacy of outsourced k-means clustering , 2014, AsiaCCS.

[7]  Francesc Sebé,et al.  Triangle randomization for social network data anonymization , 2014, Ars Math. Contemp..

[8]  Ljiljana Brankovic,et al.  VICUS - A Noise Addition Technique for Categorical Data , 2012, AusDM.

[9]  Jennifer Seberry,et al.  Applications of smartcards for anonymous and verifiable databases , 1995, Comput. Secur..

[10]  Jennifer Seberry,et al.  Fundamentals of Computer Security , 2003, Springer Berlin Heidelberg.

[11]  J Cooper,et al.  Security considerations for present and future medical databases. , 1996, International journal of bio-medical computing.

[12]  Lynn Batten,et al.  Public Key Cryptography: Applications and Attacks , 2013 .

[13]  Mirka Miller,et al.  On Range Query Usability Of Statistical Databases , 2002, Int. J. Comput. Math..

[14]  Mirka Miller,et al.  Relative Compromise of Statistical Databases , 1990, Aust. Comput. J..

[15]  Md Zahidul Islam,et al.  Privacy preserving data mining: A noise addition framework using a novel clustering technique , 2011, Knowl. Based Syst..

[16]  Jennifer Seberry,et al.  Database authentication revisited , 1994, Comput. Secur..

[17]  Ljiljana Brankovic,et al.  Quantifying Privacy: A Novel Entropy-Based Measure of Disclosure Risk , 2014, IWOCA.

[18]  Josep Domingo-Ferrer,et al.  A Survey of Inference Control Methods for Privacy-Preserving Data Mining , 2008, Privacy-Preserving Data Mining.

[19]  Ljiljana Brankovic,et al.  Data Swapping: Balancing Privacy against Precision in Mining for Logic Rules , 1999, DaWaK.

[20]  Mirka Miller,et al.  A Combinatorial Problem in Database Security , 1999, Discret. Appl. Math..

[21]  Dongxi Liu,et al.  Privacy-Preserving and Outsourced Multi-user K-Means Clustering , 2014, 2015 IEEE Conference on Collaboration and Internet Computing (CIC).

[22]  Rudolf Ahlswede,et al.  On security of statistical databases , 2006, 2006 IEEE International Symposium on Information Theory.

[23]  Ljiljana Brankovic,et al.  THE EIGENSPACE OF THE EIGENVALUE -2 IN GENERALIZED LINE GRAPHS AND A PROBLEM IN SECURITY OF STATISTICAL DATABASES , 2003 .

[24]  Gultekin Özsoyoglu,et al.  Auditing and Inference Control in Statistical Databases , 1982, IEEE Transactions on Software Engineering.

[25]  Md Zahidul Islam,et al.  Privacy-Preserving Data Mining , 2007, Security, Privacy, and Trust in Modern Data Management.

[26]  Herbert F. Jelinek,et al.  A survey of state-of-the-art methods for securing medical databases , 2018 .

[27]  Mirka Miller,et al.  An Optimization Problem in Statistical Databases , 2000, SIAM J. Discret. Math..

[28]  J. Aisbett,et al.  Shield privacy Hippocratic security method for virtual community , 2004, 30th Annual Conference of IEEE Industrial Electronics Society, 2004. IECON 2004.

[29]  Ljiljana Brankovic,et al.  2-Compromise Usability in 1-Dimensional Statistical Databases , 2002, COCOON.

[30]  Gyula O. H. Katona,et al.  On the Security of Individual Data , 2004, FoIKS.

[31]  H. Giggins,et al.  Statistical Disclosure Control: To Trust or Not to Trust , 2008, International Symposium on Computer Science and its Applications.

[32]  L. Brankovic,et al.  DETECTIVE: a decision tree based categorical value clustering and perturbation technique for preserving privacy in data mining , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..

[33]  Graham Wrightson,et al.  Usability of compromise-free statistical databases , 1997, Proceedings. Ninth International Conference on Scientific and Statistical Database Management (Cat. No.97TB100150).

[34]  Andrew Stranieri,et al.  Knowledge based regulation of statistical databases , 2006 .

[35]  Josep Domingo-Ferrer,et al.  Inference Control in Statistical Databases , 2002, Lecture Notes in Computer Science.

[36]  Md Zahidul Islam,et al.  A Framework for Privacy Preserving Classification in Data Mining , 2004, ACSW.

[37]  Mirka Miller,et al.  SUM GRAPH BASED ACCESS STRUCTURE IN A SECRET SHARING SCHEME , 2006 .

[38]  Ljiljana Brankovic,et al.  Statistical Database Security , 2007, Security, Privacy, and Trust in Modern Data Management.

[39]  Jerrold R. Griggs Database Security and the Distribution of Subset Sums in R m , 1998 .