2006
DOI: 10.1145/1127345.1127347
|View full text |Cite
|
Sign up to set email alerts
|

Auditing sum-queries to make a statistical database secure

Abstract: Abstract. In response to queries asked to a statistical database, the query system should avoid releasing summary statistics that could lead to the disclosure of confidential individual data. Attacks to the security of a statistical database may be direct or indirect, and in order to repel them, the query system should audit queries by controlling the amount of information released by their responses. The paper focuses on sumqueries with a response variable of nonnegative real type and proposes a compact repre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2007
2007
2012
2012

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(12 citation statements)
references
References 22 publications
0
12
0
Order By: Relevance
“…It has long believed that auditing is an effective tool for protection [5]. [7]. While the data attributes hold other information, usually numerical, for which some statistical queries may be desired such as Salary, Score, Income, etc [6].…”
Section: A Overview Of Solution Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…It has long believed that auditing is an effective tool for protection [5]. [7]. While the data attributes hold other information, usually numerical, for which some statistical queries may be desired such as Salary, Score, Income, etc [6].…”
Section: A Overview Of Solution Approachesmentioning
confidence: 99%
“…Also they presented an auditing procedure on such a graph and discussed the computational issues connected with its implementation. The authors in [7] focused on sum-queries with a response variable of nonnegative real type and they proposed a compact representation of answered sum-queries, called an information model in "normal form", which allows the query system to decide whether the value of a new sum-query can or cannot be safely answered. If it cannot, then the query system will issue the range of feasible values of the new sum-query consistent with previously answered sum-queries.…”
Section: Previous Workmentioning
confidence: 99%
“…Christina Yip Chung, Michael Gertz and Karl Levitt developed DEMIDS, which is a misuse detection system for database systems tailored to relational database systems [2]. Francesco M. Malvestuto, Mauro Mezzini and Marina Moscarini propose an approach to avoid releasing summary statistics that could lead to the disclosure of confidential individual data in [4]. In [8] and [10], Sin Yeung Lee, Wai Lup Low and Pei Yuen Wong describe an algorithm that summarizes the raw transactional SQL queries into compact regular expressions.…”
Section: Related Workmentioning
confidence: 99%
“…We focus on the query restriction approach, which prevents malicious inferences by denying some unsafe queries. In particular, we deal with the on-line auditing problem [6], [8], [9], [10], [12]. With on-line auditing, queries are answered one by one, in sequence, and the auditor has to determine whether the SDB is compromised when answering a new query.…”
Section: Introductionmentioning
confidence: 99%