Skip to main content
Log in

Answer-perturbation techniques for the protection of statistical databases

  • Papers
  • Published:
Statistics and Computing Aims and scope Submit manuscript

Abstract

This paper presents an answer-perturbation model for the protection of statistical databases. Compared to previous approaches, this model saves both space and time since neither a copy of the original database nor an extra processing of the query set is needed. The modularity of our protection mechanism (perturbation is applied after the query processing, not during it or upon data entry, as in the other approaches) facilitates the implementation. The method presented is user-oriented and since the usability (accuracy) of the statistically altered answers can be fine-tuned, the balance between usability and protection (security) is under the control of the database administrator.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Adam, N. R. and Wortmann, J. C. (1989) Security-control methods for statistical databases: a comparative study. ACM Computing Surveys, 21, 515–556.

    Google Scholar 

  • Beck, L. L. (1980) A security mechanism for statistical databases. ACM Transactions on Database Systems 5, 316–338.

    Google Scholar 

  • Dalenius, T. (1977) Towards a methodology for statistical disclosure control. Statistik Tidskrift, 15, 429–444.

    Google Scholar 

  • Gnedenko, B. (1976) The Theory of Probability. Mir Publishers, Moscow.

    Google Scholar 

  • Hou, W. C. and Ozsoyoglu, G. (1991) Statistical estimators for aggregate relational algebra queries. ACM Transactions on Database Systems, 16, 600–654.

    Google Scholar 

  • Liew, C. K., Choi, W. J. and Liew, C. J. (1985) A data distortion by probability distribution. ACM Transactions on Database Systems, 10, 395–411.

    Google Scholar 

  • Luchian, H. and Stamate, D. (1992) Statistical protection for statistical databases. Proceedings of the Sixth Conference on Scientific and Statistical Database Systems, Ascona, Switzerland.

  • Palley, M. A. and Simonoff, J. S. (1987) The use of regression methodology for compromise of confidential information in statistical databases. ACM Transactions on Database Systems, 12, 593–608.

    Google Scholar 

  • Traub, J. F., Yemini, Y. and Wozniakowski, H. (1984) The statistical security of a statistical database. ACM Transactions on Data Security, 9, 672–679.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Luchian, H., Stamate, D. Answer-perturbation techniques for the protection of statistical databases. Stat Comput 5, 203–213 (1995). https://doi.org/10.1007/BF00142662

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF00142662

Keywords

Navigation