Skip to main content
Log in

Uncertain inference control in privacy protection

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Context management is the key enabler for emerging context-aware applications, and it includes context acquisition, understanding and exchanging. Context exchanging should be made privacy-conscious. We can specify privacy preferences to limit the disclosure of sensitive contexts, but the sensitive contexts could still be derived from those insensitive. To date, there have been very few inference control mechanisms for context management, especially when the environments are uncertain. In this paper, we present an inference control method for private context protection in uncertain environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Agrawal, R., Kieman, J., Srikant, R., Xu, Y.: An XPath-based preference language for P3P. In: Proceedings of the 12th International WWW Conference (WWW’03), pp. 629–639. Budapest, Hungary (2003)

  2. Biskup J.: For unknown secrecies refusal is better than lying. Data Knowl. Eng. 33(1), 1–24 (2000)

    Article  MATH  Google Scholar 

  3. Biskup J., Bonatti P.A.: Lying versus refusal for known potential secrets. Data Knowl. Eng. 38(2), 199–222 (2001)

    Article  MATH  Google Scholar 

  4. Chen H., Finin T., Joshi A.: An ontology for context-aware pervasive computing environments. Knowl. Eng. Rev. Special Issue Ontol. Distrib. Syst. 18(3), 197–207 (2004)

    Google Scholar 

  5. Clark, J., DeRose, S.: XML Path language (XPath) Version 1.0. Tech. Rep., W3C Recommendation. http://www.w3.org/TR/xpath (1999)

  6. Cook, S.A.: The complexity of theorem-proving procedure. In: Harrison, M.A., Banerji, R.B., Ullman, J.D. (eds.) Proceedings of the 3rd Annual ACM Symposium on Theory of Computing (STOC’71), pp. 151–158. Shaker Heights, OH (1971)

  7. Cranor, L., Langheinrich, M., Marchiori, M.: A P3P preference exchange language 1.0 (APPEL 1.0). Tech. Rep., W3C Working Draft, http://www.w3.org/TR/P3P-preference

  8. Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall M., Reagle, J.: The platform for privacy preferences 1.0 (P3P 1.0) specification. Tech. Rep., W3C Recommendation, http://www.w3.org/TR/P3P (2002)

  9. Denning D.E., Schlörer J.: Inference control for statistical databases. IEEE Comput. 16(7), 69–82 (1983)

    Google Scholar 

  10. Dey A.: Understanding and using context. Pers. Ubiquitous Comput. 5(1), 4–7 (2001)

    Article  Google Scholar 

  11. Dey A., Mankoff J., Abowd G., Carter S.: Distributed mediation of ambiguous context in aware environments. In: Beaudouin-Lafon, M. (eds) Proceedings of the 15th Annual ACM Symposium on User Interface Software and Technology (UIST’02), pp. 121–130. France, Paris (2002)

    Chapter  Google Scholar 

  12. Fellegi I.: On the question of statistical confidentiality. J. Am. Stat. Assoc. 67(337), 7–18 (1972)

    Article  MATH  Google Scholar 

  13. Gandon F.L., Sadeh N.M.: Semantic web technologies to reconcile privacy and context awareness. J. Web Semant. 1(3), 241–260 (2004)

    Google Scholar 

  14. Hogben, G.: P3P using the semantic web (OWL ontology, RDF policy and RDQL rules). Tech. Rep., W3C Working Group Note, http://www.w3.org/P3P/2004/040920_p3p-sw.html (2004)

  15. Hogben G.: Describing the P3P base data schema using OWL. In: Kagal, L., Finin, T., Hendler, J. (eds) Policy Management for the Web (PM4W): Proceedings of the 14th World Wide Web Conference (WWW’05) Workshop, pp. 44–51. Chiba, Japan (2005)

    Google Scholar 

  16. Kagal L., Finin T., Joshi A.: A policy language for pervasive systems. In: Lutfiyya, H., Moffett, J., Garcia, F. (eds) Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY’03), pp. 63–76. Lake Como, Italy (2003)

    Chapter  Google Scholar 

  17. Kagal, L., Finin, T., Joshi, A.: Declarative policies for describing web services capabilities and constraints. In: Nottingham, M., Hégaret, P.L. (eds.) Proceedings of the W3C Workshop on Constraints and Capabilities for Web Services. Redwood Shores, CA (2004)

  18. Kolari P., Ding L., Ganjugunte S., Kagal L., Joshi A., Finin T.: Enhancing web privacy protection through declarative policies. In: Sahai, A., Winsborough, W.H. (eds) Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY’05), pp. 57–66. Stockholm, Sweden (2005)

    Chapter  Google Scholar 

  19. Kuenzer, A., Schlick, C., Ohmann, F., Schmidt, L., Luczak, H.: An empirical study of dynamic Bayesian networks for user modeling. In: Proceedings of the UM-2001 Workshop on Machine Learning for User Modeling, pp. 1–10. Sonthofen, Germany (2001)

  20. McBride, B., Wenning, R., Cranor, L.: A RDF schema for P3P. Tech. Rep., W3C Note, http://www.w3.org/TR/p3p-rdfschema (2002)

  21. Neapolitan R.E.: Learning Bayesian Networks. Prentice Hall, Upper Saddle River (2003)

    Google Scholar 

  22. Pearl J.: Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, San Franciso (1988)

    Google Scholar 

  23. Shafir E.: Probabilistic reasoning. In: Wilson, R.A., Keil, F.C. (eds) The MIT Encyclopedia of the Cognitive Sciences (MITECS), pp. 671–672. MIT, Cambridge (2001)

    Google Scholar 

  24. Sicherman G.L., de Jonge W., van de Riet R.P.: Answering queries without revealing secrets. ACM Trans. Database Syst. 8(1), 41–59 (1983)

    Article  MATH  Google Scholar 

  25. Staddon, J.: Dynamic inference control. In: Zaki, M.J., Aggarwal, C.C. (eds.) Proceedings of the 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD’03), pp. 94–100. San Diego, CA (2003)

  26. Yip, R.W., Levitt, K.N.: Data level inference detection in database systems. In: Proceedings of the 11th IEEE Computer Security Foundations Workshop, pp. 179–189. Rockport, MA (1998)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangdong An.

Rights and permissions

Reprints and permissions

About this article

Cite this article

An, X., Jutla, D., Cercone, N. et al. Uncertain inference control in privacy protection. Int. J. Inf. Secur. 8, 423–431 (2009). https://doi.org/10.1007/s10207-009-0088-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-009-0088-z

Keywords

Navigation