Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Protecting Privacy of Sensitive Value Distributions in Data Release

  • Conference paper
Security and Trust Management (STM 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6710))

Included in the following conference series:

Abstract

In today’s electronic society, data sharing and dissemination are more and more increasing, leading to concerns about the proper protection of privacy. In this paper, we address a novel privacy problem that arises when non sensitive information is incrementally released and sensitive information can be inferred exploiting dependencies of sensitive information on the released data. We propose a model capturing this inference problem where sensitive information is characterized by peculiar distributions of non sensitive released data. We also discuss possible approaches for run time enforcement of safe releases.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Adam, N.R., Wortmann, J.C.: Security-control methods for statistical databases: A comparative study. ACM Computing Surveys 21(4), 515–556 (1989)

    Article  Google Scholar 

  2. Aggarwal, C., Yu, P.S. (eds.): Privacy-Preserving Data Mining: Models and Algorithms. Springer, Heidelberg (2008)

    Google Scholar 

  3. Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: k-Anonymity. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems, Springer, Heidelberg (2007)

    Google Scholar 

  4. Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Microdata protection. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems. Springer, Heidelberg (2007)

    Google Scholar 

  5. Dawson, S., De Capitani di Vimercati, S., Lincoln, P., Samarati, P.: Maximizing sharing of protected information. Journal of Computer and System Sciences 64(3), 496–541 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  6. De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragments and loose associations: Respecting privacy in data publishing. In: Proc. of the VLDB Endowment, vol. 3(1) (2010)

    Google Scholar 

  7. Denning, D.D., Lunt, T.F., Schell, R.R., Heckman, M., Shockley, W.R.: The seaview security model. IEEE Transactions of Software Engineering 16(6), 593–607 (1990)

    Article  Google Scholar 

  8. Fano, R.M.: Transmission of Information; A Statistical Theory of Communications. MIT University Press, New York (1961)

    MATH  Google Scholar 

  9. Frikken, K.B., Zhang, Y.: Yet another privacy metric for publishing micro-data. In: Proc. of the 7th ACM Workshop on Privacy in the Electronic Society (WPES 2008), Alexandria, VA, USA (October 2008)

    Google Scholar 

  10. Goguen, J.A., Meseguer, J.: Unwinding and inference control. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, USA (May 1984)

    Google Scholar 

  11. Haigh, J.T., O’Brien, R.C., Thomsen, D.J.: The LDV secure relational DBMS model. In: Jajodia, S., Landwehr, C.E. (eds.) Database Security, IV: Status and Prospects, pp. 265–279. Elsevier Science Publishers, North-Holland (1991)

    Google Scholar 

  12. Hinke, T.H., Delugach, H.S., Chandrasekhar, A.: A fast algorithm for detecting second paths in database inference analysis. Journal of Computer Security 3(2/3), 147–168 (1995)

    Article  Google Scholar 

  13. Jajodia, S., Meadows, C.: Inference problems in multilevel secure database management systems. In: Information Security: an Integrated Collection of Essays, pp. 570–584. IEEE Computer Sociery Press, Los Alamitos (1995)

    Google Scholar 

  14. LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: Proc. of the 22nd IEEE International Conference on Data Engineering (ICDE 2006), Atlanta, GA, USA (April 2006)

    Google Scholar 

  15. Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and ℓ-diversity. In: Proc. of the 23rd IEEE International Conference on Data Engineering (ICDE 2007), Istanbul, Turkey (April 2007)

    Google Scholar 

  16. Lunt, T.F.: Aggregation and inference: facts and fallacies. In: IEEE Symposium on Security and Privacy, Oakland, CA, USA (May 1989)

    Google Scholar 

  17. Machanavajjhala, A., Gehrke, J., Kifer, D.: ℓ-density: Privacy beyond k-anonymity. In: Proc. of the 22nd IEEE International Conference on Data Engineering (ICDE 2006), Atlanta, GA, USA (April 2006)

    Google Scholar 

  18. Marks, D.G., Motro, A., Jajodia, S.: Enhancing the controlled disclosure of sensitive information. In: Martella, G., Kurth, H., Montolivo, E., Hwang, J. (eds.) ESORICS 1996. LNCS, vol. 1146, Springer, Heidelberg (1996)

    Google Scholar 

  19. Morgenstern, M.: Controlling logical inference in multilevel database systems. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, USA (May 1988)

    Google Scholar 

  20. Qian, X., Stickel, M.E., Karp, P.D., Lunt, T.F., Garvey, T.D.: Detection and elimination of inference channels in multilevel relational database. In: Proc. of the 1993 IEEE Symposium on Research in Security and Privacy, Oakland, CA, USA (May 1993)

    Google Scholar 

  21. Samarati, P.: Protecting respondents identities in microdata release. IEEE Transactions on Knowledge and Data Engineering 13(6), 1010–1027 (2001)

    Article  Google Scholar 

  22. Schaefer, M. (ed.): Multilevel data management security. Air Force Studies Board Committee on Multilevel Data Management Security (1983)

    Google Scholar 

  23. Smith, G.W.: Modeling security-relevant data semantics. IEEE Transactions on Software Engineering 17(11), 1195–1203 (1991)

    Article  Google Scholar 

  24. Smyth, P., Goodman, R.M.: An information theoretic approach to rule induction from databases. IEEE Transactions on Knowledge and Data Engineering 4(4), 301–316 (1992)

    Article  Google Scholar 

  25. Xiao, X., Tao, Y.: Anatomy: Simple and effective privacy preservation. In: Proc. of the 32nd International Conference on Very Large Data Bases (VLDB 2006), Seoul, Korea (September 2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bezzi, M., De Capitani di Vimercati, S., Livraga, G., Samarati, P. (2011). Protecting Privacy of Sensitive Value Distributions in Data Release. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds) Security and Trust Management. STM 2010. Lecture Notes in Computer Science, vol 6710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22444-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22444-7_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22443-0

  • Online ISBN: 978-3-642-22444-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics