2008
DOI: 10.1007/978-0-387-70992-5_17
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Query Auditing Techniques for Data Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…Prior work on querying private data has investigated two techniques: auditing and perturbation. Query auditing, in which queries are denied if the answers may lead to privacy breaches, has proven to be computationally hard and surprisingly subtle (because even a denial can lead to a privacy breach) [24]. Perturbation injects random noise into the query answers, creating uncertainty about the state of the underlying database.…”
Section: Answering Network Queries Privatelymentioning
confidence: 99%
“…Prior work on querying private data has investigated two techniques: auditing and perturbation. Query auditing, in which queries are denied if the answers may lead to privacy breaches, has proven to be computationally hard and surprisingly subtle (because even a denial can lead to a privacy breach) [24]. Perturbation injects random noise into the query answers, creating uncertainty about the state of the underlying database.…”
Section: Answering Network Queries Privatelymentioning
confidence: 99%
“…The above query auditing techniques have several problems. First and foremost, refusing to answer a query itself can leak information about the underlying dataset (i.e., D) [44]. This would not be the case if refusal was independent of the underlying dataset (e.g., auditing is carried out without accessing the true answers c).…”
Section: Syntactic Anonymizationmentioning
confidence: 99%
“…Query and Result Filtering To complement access control and enable more flexible policies, the database community has invested significant research e↵ort in developing query auditing and result filtering systems [25]. Auditing provides two significant improvements over methods purely based on access control: First, auditing allows for flexible, detailed, and context-sensitive policies, as decisions can be based on arbitrary processing of query text, rather than a model based on rows, columns, and user roles.…”
Section: Traditional Approaches To Privacy In Databasesmentioning
confidence: 99%