Skip to main content

Quantifying Privacy Leakage through Answering Database Queries

  • Conference paper
  • First Online:
Information Security (ISC 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2433))

Included in the following conference series:

Abstract

We assume a database consists of records of individuals with private or sensitive fields. Queries on the distribution of a sensitive field within a selected population in the database can be submitted to the data center. The answers to the queries leak private information of individuals though no identification information is provided. Inspired by decision theory, we present a quantitative model for the privacy protection problem in such a database query or linkage environment in this paper. In the model, the value of information is estimated from the viewpoint of the querier.

To estimate the value, we define the information state of the data user by a class of probability distributions on the set of possible confidential values. We further define the usefulness of information based on how easy the data user can locate individuals that fit the description given in the queries. These states and the usefulness of information can be modified and refined by the user’s knowledge acquisition actions. The value of information is then defined as the expected gain of the privacy receiver and the privacy is protected by imposing costs on the answers of the queries for balancing the gain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Y.-C. Chiang. Protecting privacy in public database (in Chinese). Master’s thesis, Graduate Institute of Information Management, National Taiwan University, 2000.

    Google Scholar 

  2. Y.-C. Chiang, T.-s. Hsu, S. Kuo, and D.-W. Wang. Preserving confidentially when sharing medical data. In Proceedings of Asia Pacific Medical Informatics Conference, 2000.

    Google Scholar 

  3. Y.T. Chiang, Y.C. Chiang, T.-s. Hsu, C.-J. Liau, and D.-W. Wang. How much privacy?-a system to safe guard personal privacy while releasing database. In Proceedings of the 3rd International Conference on Rough Sets and Current Trends in Computing, LNCS. Springer-Verlag, 2002.

    MATH  Google Scholar 

  4. F. Y. Chin and G. Özsoyoğlu. Auditing and inference control in statistical databases. IEEE Transactions Software Engineering, 8:574–582, 1982.

    Article  MathSciNet  Google Scholar 

  5. L. H. Cox. Suppression methodology and statistical disclosure control. Journal of the American Statistical Association, 75:377–385, 1980.

    Article  Google Scholar 

  6. D. E. R. Denning. Cryptography and Data Security. Addison-Wesley, 1982.

    Google Scholar 

  7. G.D. Eppen and F.J. Gould. Quantitative Concepts for Management. Prentice Hall, 1985.

    Google Scholar 

  8. F. Duarte de Carvalho, N. P. Dellaert, and M. de Sanches Osório. Statistical disclosure in two-dimensional tables: General tables. Journal of the American Statistical Association, 428:1547–1557, 1994.

    Article  MathSciNet  Google Scholar 

  9. D. Gusfield. A graph theoretic approach to statistical data security. SIAM Journal on Computing, 17:552–571, 1988.

    Article  MathSciNet  Google Scholar 

  10. T.-s. Hsu and M. Y. Kao. Security problems for statistical databases with general cell suppressions. In Proceedings of the 9th International Conference on Scientific and Statistical Database Management, pages 155–164, 1997.

    Google Scholar 

  11. T.-s. Hsu, C.-J. Liau, and D.-W. Wang. A logical model for privacy protection. In Proceedings of the 4th International Conference on Information Security, LNCS 2200, pages 110–124. Springer-Verlag, 2001.

    MATH  Google Scholar 

  12. A.J. Hundepool and L.C.R.J. Willenborg. “μ-and τ-ARGUS: Software for statistical disclosure control”. In Proceedings of the 3rd International Seminar on Statistical Confidentiality, 1996.

    Google Scholar 

  13. J. Kleinberg, C.H. Papadimitriou, and P. Raghavan. “On the value of private information”. In Proc. 8th Conf. on Theoretical Aspects of Rationalityand Knowledge, 2001.

    Google Scholar 

  14. D.V. Lindley. Making Decisions. John Wiley & Sons, 1985.

    Google Scholar 

  15. T.S. Mayer. Privacy and confidentiality research and the u.s. census bureau recommendations based on a review of the literature. Technical Report RSM2002/01, U.S. Bureau of the Census, 2002.

    Google Scholar 

  16. T. Mitchell. Machine Learning. McGraw-Hill, 1997.

    Google Scholar 

  17. Z. Pawlak. Rough Sets-Theoretical Aspects of Reasoning about Data. Kluwer Academic Publishers, 1991.

    Google Scholar 

  18. P. Samarati. “Protecting respondents' identities in microdata release”. IEEE Transactions on Knowledge and Data Engineering, 13(6):1010–1027, 2001.

    Article  Google Scholar 

  19. P. Samarati and L. Sweeney. Protecting privacy when disclosing information: kanonymity and its enforcement through generalization and suppression. Technical report SRI-CSL-98-04, Computer Science Laboratory, SRI International, 1998.

    Google Scholar 

  20. C.E. Shannon. “The mathematical theory of communication”. The Bell System Technical Journal, 27(3&4):379–423,623-656, 1948.

    Article  MathSciNet  Google Scholar 

  21. L. Sweeney. “Guaranteeing anonymity when sharing medical data, the Datafly system”. In Proceedings of American Medical Informatics Association, 1997.

    Google Scholar 

  22. W. E. Winkler. The state of record linkage and current research problems. Technical Report RR99/04, U.S. Bureau of the Census, 1999.

    Google Scholar 

  23. W. E. Winkler. Record linkage software and methods for merging administrative lists. Technical Report RR01/03, U.S. Bureau of the Census, 2001.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tsan-sheng, H., Churn-Jung, L., Da-Wei, W., Chen, J.KP. (2002). Quantifying Privacy Leakage through Answering Database Queries. In: Chan, A.H., Gligor, V. (eds) Information Security. ISC 2002. Lecture Notes in Computer Science, vol 2433. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45811-5_12

Download citation

  • DOI: https://doi.org/10.1007/3-540-45811-5_12

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44270-7

  • Online ISBN: 978-3-540-45811-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics