Enabling Statistical Analysis of Suppressed Tabular Data

For decades, NSOs have usedcomplementary cell suppression for disclosure limitation of tabular data, magnitude data in particular. Indications of its continued use abound, even though suppression thwarts statistical analysis of both the expert and the novice. We introduce methods for creating alternative tables that the NSO can release unsuppressed, while ensuring within statistical certainty that their analysis is conformal with analysis of the original.

[1]  L. Cox Suppression Methodology and Statistical Disclosure Control , 1980 .

[2]  Lawrence H. Cox Vulnerability of Complementary Cell Suppression to Intruder Attack , 2010, J. Priv. Confidentiality.

[3]  James P. Kelly,et al.  Balancing Quality and Confidentiality for Multivariate Tabular Data , 2004, Privacy in Statistical Databases.

[4]  L. Cox On properties of multi-dimensional statistical tables , 2003 .

[5]  L. Cox CONTINGENCY TABLES OF NETWORK TYPE: MODELS, MARKOV BASIS AND APPLICATIONS , 2007 .

[6]  Lawrence H. Cox Invited Talk - Inference Control Problems in Statistical Database Query Systems , 2004, DBSec.

[7]  Lawrence H. Cox,et al.  Network Models for Complementary Cell Suppression , 1995 .

[8]  Juan José SALAZAR-GONZÁLEZ Statistical confidentiality: Optimization techniques to protect tables , 2008 .

[9]  James P. Kelly,et al.  Cell suppression: Disclosure protection for sensitive tabular data , 1992, Networks.

[10]  Lawrence H. Cox A Data Quality and Data Confidentiality Assessment of Complementary Cell Suppression , 2008, Privacy in Statistical Databases.

[11]  Alan F. Karr,et al.  Risk‐Utility Paradigms for Statistical Disclosure Limitation: How to Think, But Not How to Act , 2011 .

[12]  James D. Westervelt,et al.  1.5 Million Missing Numbers: Overcoming Employment Suppression in County Business Patterns Data , 2006 .

[13]  S E Fienberg,et al.  INAUGURAL ARTICLE by a Recently Elected Academy Member:Bounds for cell entries in contingency tables given marginal totals and decomposable graphs , 2000 .

[14]  M. Fischetti,et al.  Models and Algorithms for Optimizing Cell Suppression in Tabular Data with Linear Constraints , 2000 .

[15]  Ivan P. Fellegi,et al.  On the Question of Statistical Confidentiality , 1972 .

[16]  Vijayalakshmi Atluri,et al.  Uniform Indexing for Geospatial Data and Authorizations , 2002, DBSec.

[17]  Lawrence H. Cox,et al.  A Method for Preserving Statistical Distributions Subject to Controlled Tabular Adjustment , 2006, Privacy in Statistical Databases.

[18]  Jerome P. Reiter,et al.  Multiple Imputation for Statistical Disclosure Limitation , 2003 .

[19]  Matteo Fischetti,et al.  Solving the Cell Suppression Problem on Tabular Data with Linear Constraints , 2001, Manag. Sci..

[20]  N. Balakrishnan,et al.  Moments of order statistics from truncated log-logistic distribution , 1987 .

[21]  Jerome P. Reiter,et al.  Releasing multiply imputed, synthetic public use microdata: an illustration and empirical study , 2005 .