Abstract
In today’s electronic society, data sharing and dissemination are more and more increasing, leading to concerns about the proper protection of privacy. In this paper, we address a novel privacy problem that arises when non sensitive information is incrementally released and sensitive information can be inferred exploiting dependencies of sensitive information on the released data. We propose a model capturing this inference problem where sensitive information is characterized by peculiar distributions of non sensitive released data. We also discuss possible approaches for run time enforcement of safe releases.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Adam, N.R., Wortmann, J.C.: Security-control methods for statistical databases: A comparative study. ACM Computing Surveys 21(4), 515–556 (1989)
Aggarwal, C., Yu, P.S. (eds.): Privacy-Preserving Data Mining: Models and Algorithms. Springer, Heidelberg (2008)
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: k-Anonymity. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems, Springer, Heidelberg (2007)
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Microdata protection. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems. Springer, Heidelberg (2007)
Dawson, S., De Capitani di Vimercati, S., Lincoln, P., Samarati, P.: Maximizing sharing of protected information. Journal of Computer and System Sciences 64(3), 496–541 (2002)
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragments and loose associations: Respecting privacy in data publishing. In: Proc. of the VLDB Endowment, vol. 3(1) (2010)
Denning, D.D., Lunt, T.F., Schell, R.R., Heckman, M., Shockley, W.R.: The seaview security model. IEEE Transactions of Software Engineering 16(6), 593–607 (1990)
Fano, R.M.: Transmission of Information; A Statistical Theory of Communications. MIT University Press, New York (1961)
Frikken, K.B., Zhang, Y.: Yet another privacy metric for publishing micro-data. In: Proc. of the 7th ACM Workshop on Privacy in the Electronic Society (WPES 2008), Alexandria, VA, USA (October 2008)
Goguen, J.A., Meseguer, J.: Unwinding and inference control. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, USA (May 1984)
Haigh, J.T., O’Brien, R.C., Thomsen, D.J.: The LDV secure relational DBMS model. In: Jajodia, S., Landwehr, C.E. (eds.) Database Security, IV: Status and Prospects, pp. 265–279. Elsevier Science Publishers, North-Holland (1991)
Hinke, T.H., Delugach, H.S., Chandrasekhar, A.: A fast algorithm for detecting second paths in database inference analysis. Journal of Computer Security 3(2/3), 147–168 (1995)
Jajodia, S., Meadows, C.: Inference problems in multilevel secure database management systems. In: Information Security: an Integrated Collection of Essays, pp. 570–584. IEEE Computer Sociery Press, Los Alamitos (1995)
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: Proc. of the 22nd IEEE International Conference on Data Engineering (ICDE 2006), Atlanta, GA, USA (April 2006)
Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and ℓ-diversity. In: Proc. of the 23rd IEEE International Conference on Data Engineering (ICDE 2007), Istanbul, Turkey (April 2007)
Lunt, T.F.: Aggregation and inference: facts and fallacies. In: IEEE Symposium on Security and Privacy, Oakland, CA, USA (May 1989)
Machanavajjhala, A., Gehrke, J., Kifer, D.: ℓ-density: Privacy beyond k-anonymity. In: Proc. of the 22nd IEEE International Conference on Data Engineering (ICDE 2006), Atlanta, GA, USA (April 2006)
Marks, D.G., Motro, A., Jajodia, S.: Enhancing the controlled disclosure of sensitive information. In: Martella, G., Kurth, H., Montolivo, E., Hwang, J. (eds.) ESORICS 1996. LNCS, vol. 1146, Springer, Heidelberg (1996)
Morgenstern, M.: Controlling logical inference in multilevel database systems. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, USA (May 1988)
Qian, X., Stickel, M.E., Karp, P.D., Lunt, T.F., Garvey, T.D.: Detection and elimination of inference channels in multilevel relational database. In: Proc. of the 1993 IEEE Symposium on Research in Security and Privacy, Oakland, CA, USA (May 1993)
Samarati, P.: Protecting respondents identities in microdata release. IEEE Transactions on Knowledge and Data Engineering 13(6), 1010–1027 (2001)
Schaefer, M. (ed.): Multilevel data management security. Air Force Studies Board Committee on Multilevel Data Management Security (1983)
Smith, G.W.: Modeling security-relevant data semantics. IEEE Transactions on Software Engineering 17(11), 1195–1203 (1991)
Smyth, P., Goodman, R.M.: An information theoretic approach to rule induction from databases. IEEE Transactions on Knowledge and Data Engineering 4(4), 301–316 (1992)
Xiao, X., Tao, Y.: Anatomy: Simple and effective privacy preservation. In: Proc. of the 32nd International Conference on Very Large Data Bases (VLDB 2006), Seoul, Korea (September 2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bezzi, M., De Capitani di Vimercati, S., Livraga, G., Samarati, P. (2011). Protecting Privacy of Sensitive Value Distributions in Data Release. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds) Security and Trust Management. STM 2010. Lecture Notes in Computer Science, vol 6710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22444-7_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-22444-7_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22443-0
Online ISBN: 978-3-642-22444-7
eBook Packages: Computer ScienceComputer Science (R0)