Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-540-30570-5_16guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Privacy in database publishing

Published: 05 January 2005 Publication History

Abstract

We formulate and study a privacy guarantee to data owners, who share information with clients by publishing views of a proprietary database. The owner identi.es the sensitive proprietary data using a secret query against the proprietary database. Given an extra view, the privacy guarantee ensures that potential attackers will not learn any information about the secret that could not already be obtained from the existing views. We de.ne “learning” as the modi.cation of the attacker's a-priori probability distribution on the set of possible secrets. We assume arbitrary a-priori distributions (including distributions that correlate the existence of particular tuples) and solve the problem when secret and views are expressed as unions of conjunctive queries with non-equalities, under integrity constraints. We consider guarantees (a) for given view extents (b) for given domain of the secret and (c) independent of the domain and extents.

References

[1]
S. Abiteboul, P. Kanellakis, and G. Grahne. On the representation and querying of sets of possible worlds. Theoretical Computer Science, 78:159-187, 1991.
[2]
Serge Abiteboul, Richard Hull, and Victor Vianu. Foundations of Databases. Addison-Wesley, 1995.
[3]
Michal Bielecki and Jan Van den Bussche. Database interrogation using conjunctive queries. In ICDT, pages 259-269, 2003.
[4]
Diego Calvanese, Giuseppe De Giacomo, Maurizio Lenzerini, and Moshe Y. Vardi. Lossless regular views. In Symposium on Principles of Database Systems (PODS 2002), pages 247-258, 2002.
[5]
Alin Deutsch and Val Tannen. XML Queries and Constraints, Containment and Reformulation. To appear in J. Theoretical Computer Science (TCS), 2005.
[6]
Alin Deutsch and Yannis Papakonstantinou. Privacy in Database Publishing. Technical report, Department of Computer Science and Engineering, UCSD, 2004. Extended version of this paper, available from http://www.db.ucsd.edu.
[7]
A. Deutsch, L. Sui, and V. Vianu. Queryies determined by views. Manuscript available from http://www.db.ucsd.edu/people/alin/papers/QdV.ps, 2004.
[8]
Alin Deutsch and Val Tannen. Reformulation of xml queries and constraints. In ICDT, 2003.
[9]
Oliver M. Duschka, Michael R. Genesereth, and Alon Y. Levy. Recursive query plans for data integration. Journal of Logic Programming, 43(1):49-73, 2000.
[10]
A. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In PODS, 2003.
[11]
Gösta Grahne and Alberto O. Mendelzon. Tableau techniques for querying information sources through global schemas. In ICDT, 1999.
[12]
Alon Halevy. Logic-based techniques in data integration. In Logic Based Artificial Intelligence, 2000.
[13]
G. Miklau and D. Suciu. Cryptographically enforced conditional access for xml. In WebDB, 2002.
[14]
Gerome Miklau and Dan Suciu. Controlling access to published data using cryptography. In VLDB, 2003.
[15]
Gerome Miklau and Dan Suciu. A formal analysis of information disclosure in data exchange. In SIGMOD Conf., 2004.
[16]
Shariq Rizvi, Alberto O. Mendelzon, S. Sudarshan, and Prasan Roy. Extending query rewriting techniques for fine-grained access control. In SIGMOD Conf., 2004.
[17]
Murray R Spiegel, John J. Schiller, and R. Alu Srinivasan. Schaum's Outline of Probability and Statistics. MCGraw-Hill, 2000.
[18]
Jeffrey D. Ullman. Information integration using logical views. In Proceedings of the Sixth International Conference on Database Theory, 1997.
[19]
K. Wagner. The complexity of combinatorial problems with succinct input representation. Acta Informatica, 23:325-356, 1986.
[20]
Winslett et. al. The TrustBuilder Project. Publications Available from http://drl.cs.uiuc.edu/security/pubs.html.

Cited By

View all
  • (2015)Controlled query evaluation for datalog and OWL 2 profile ontologiesProceedings of the 24th International Conference on Artificial Intelligence10.5555/2832581.2832652(2883-2889)Online publication date: 25-Jul-2015
  • (2013)Controlled Query Evaluation over OWL 2 RL OntologiesProceedings of the 12th International Semantic Web Conference - Part I10.1007/978-3-642-41335-3_4(49-65)Online publication date: 21-Oct-2013
  • (2012)Detecting dependencies in an anonymized datasetProceedings of the International Conference on Advances in Computing, Communications and Informatics10.1145/2345396.2345410(82-89)Online publication date: 3-Aug-2012
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
ICDT'05: Proceedings of the 10th international conference on Database Theory
January 2005
413 pages
ISBN:3540242880
  • Editors:
  • Thomas Eiter,
  • Leonid Libkin

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 05 January 2005

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2015)Controlled query evaluation for datalog and OWL 2 profile ontologiesProceedings of the 24th International Conference on Artificial Intelligence10.5555/2832581.2832652(2883-2889)Online publication date: 25-Jul-2015
  • (2013)Controlled Query Evaluation over OWL 2 RL OntologiesProceedings of the 12th International Semantic Web Conference - Part I10.1007/978-3-642-41335-3_4(49-65)Online publication date: 21-Oct-2013
  • (2012)Detecting dependencies in an anonymized datasetProceedings of the International Conference on Advances in Computing, Communications and Informatics10.1145/2345396.2345410(82-89)Online publication date: 3-Aug-2012
  • (2010)Turning privacy leaks into floodsProceedings of the 9th annual ACM workshop on Privacy in the electronic society10.1145/1866919.1866923(21-30)Online publication date: 4-Oct-2010
  • (2010)k-jump strategy for preserving privacy in micro-data disclosureProceedings of the 13th International Conference on Database Theory10.1145/1804669.1804684(104-115)Online publication date: 23-Mar-2010
  • (2010)Privacy-preserving data publishingACM Computing Surveys10.1145/1749603.174960542:4(1-53)Online publication date: 23-Jun-2010
  • (2009)Publishing naive Bayesian classifiersProceedings of the VLDB Endowment10.14778/1687627.16877592:1(1174-1185)Online publication date: 1-Aug-2009
  • (2009)Detecting privacy violations in database publishing using disjoint queriesProceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology10.1145/1516360.1516390(252-262)Online publication date: 24-Mar-2009
  • (2008)Verification of the security against inference attacks on XML databasesProceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development10.5555/1791734.1791777(359-370)Online publication date: 26-Apr-2008
  • (2008)Privacy-Preserving Query Answering in Logic-based Information SystemsProceedings of the 2008 conference on ECAI 2008: 18th European Conference on Artificial Intelligence10.5555/1567281.1567295(40-44)Online publication date: 27-Jun-2008
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media