Skip to main content
Log in

Reasoning under uncertainty and multi-criteria decision making in data privacy

  • Published:
Quality & Quantity Aims and scope Submit manuscript

Abstract

By means of an integration of decision theory and probabilistic models, we explore and develop methods for improving data privacy. Our work encompasses disclosure control tools in statistical databases and privacy requirements prioritization; in particular we propose a Bayesian approach for the on-line auditing in Statistical Databases and Pairwise Comparison Matrices for privacy requirements prioritization. The first approach is illustrated by means of examples in the context of statistical analysis on the census and medical data, where no salary (resp. no medical information), that could be related to a specific employee (resp. patient), must be released; the second approach is illustrated by means of examples, such as an e-voting system and an e-banking service that have to satisfy privacy requirements in addition to functional and security ones. Several fields in the social sciences, economics and engineering will benefit from the advances in this research area: e-voting, e-government, e-commerce, e-banking, e-health, cloud computing and risk management are a few examples of applications for the findings of this research.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Adam, N.R., Wortmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Comput. Surv. 21(4), 515–556 (1989)

    Article  Google Scholar 

  • Barzilai, J.: Consistency measures for pairwise comparison matrices. J. Multi-Criteria Decis. Anal. 7, 123–132 (1998)

    Article  Google Scholar 

  • Basile, L., D’Apuzzo, L.: Weak consistency and quasi-linear means imply the actual ranking. Int. J. Uncertain. Fuzziness Knowledge-Based Syst. 10(3), 227–239 (2002)

    Article  Google Scholar 

  • Beck, L.L.: A security mechanism for statistical databases. ACM Trans. Database Syst. 5(3), 316–338 (1980)

    Article  Google Scholar 

  • Bijwe, A., Mead, N.R.: Adapting the square process for privacy requirements engineering. Software Engineering Institute, Carnegie Mellon University, Tech. Rep. (2010)

  • Blum, A., Dwork, C., Mcsherry, F., Nissim, K.: Practical privacy: The sulq framework. In: Proceedings of the International Conference on Principles of Data Systems (PODS), (2005)

  • Cambridge: Cambridge voters list database City of Cambridge, Massachusetts (1997)

  • Canfora, G., Cavallo, B.: A bayesian approach for on-line max and min auditing, pp. 12–20. In: Proocedings of International Workshop on Privacy and Anonymity in Information Society (PAIS), ACM DL, (2008a)

  • Canfora, G., Cavallo, B.: A bayesian approach for on-line max auditing, pp. 1020–1027. In: Proocedings of The 3rd International Conference on Availability, Reliability and Security (ARES), IEEE Computer Society Press, (2008b)

  • Canfora, G., Cavallo, B.: Reasoning under uncertainty in on-line auditing. In: Domingo-Ferrer, J., Saygin, Y. (eds.) Privacy in Statistical Databases. Lecture Notes in Computer Science, vol. 5262, pp. 257–269. Springer, Heidelberg (2008c)

  • Canfora, G., Cavallo, B.: A bayesian approach for on-line max auditing of dynamic statistical databases, In: EDBT/ICDT Workshops, pp. 107–116 (2009a)

  • Canfora, G., Cavallo, B.: A bayesian model for disclosure control in statistical databases. Data Knowl. Eng. 68(11), 1187–1205 (2009b)

    Article  Google Scholar 

  • Canfora, G., Cavallo, B.: A probabilistic approach for on-line sum-auditing, In: ARES, pp. 303–308 (2010)

  • Cavallo, B.: Metodi, modelli e tecnologie per la data privacy. ZeroUno 353, 90–93 (2011)

    Google Scholar 

  • Cavallo, B., Canfora, G.: A bayesian approach for on-line sum/count/max/min auditing on boolean data. In: Domingo-Ferrer, J., Tinnirello, I. (eds.) Privacy in Statistical Databases. Lecture Notes in Computer Science, pp. 295–307. Springer, Heidelberg (2012)

  • Cavallo, B., D’Apuzzo, L.: A general unified framework for pairwise comparison matrices in multicriterial methods. Int. J. Intell. Syst. 24(4), 377–398 (2009a)

    Article  Google Scholar 

  • Cavallo, B., D’Apuzzo, L.: Transitive pairwise comparison matrices over abelian linearly ordered groups. In: Bulucea, C. A., Mladenov, V., Pop, E., Leba, M., Mastorakis, N. (eds.) Recent advances in Applied Mathematics, World Scientific and Engineering Academy and Society (WSEAS), pp. 207–212. Stevens Point Wisconsin, USA (2009b)

  • Cavallo, B., D’Apuzzo, L.: Characterizations of consistent pairwise comparison matrices over abelian linearly ordered groups. Int. J. Intell. Syst. 25(10), 1035–1059 (2010)

    Article  Google Scholar 

  • Cavallo, B., D’Apuzzo, L.: Deriving weights from a pairwise comparison matrix over an alo-group. Soft Comput. 16(2), 353–366 (2012a)

    Article  Google Scholar 

  • Cavallo, B., D’Apuzzo, L.: Investigating properties of the \(\odot \)-consistency index. In: IPMU (4), pp. 315–327 (2012b)

  • Cavallo, B., D’Apuzzo, L., Squillante, M.: Building consistent pairwise comparison matrices over abelian linearly ordered groups, pp. 237–248. In: ADT (2009)

  • Cavallo, B., DApuzzo, L., Marcarelli, G.: Pairwise comparison matrices: some issue on consistency and a new consistency index. In: Greco, S., Marques Pereira, R., Squillante, M., Yager, R., Kacprzyk, J. (eds.) Preferences and Decisions, Studies in Fuzziness and Soft Computing, vol. 257, pp. 111–122. Springer, Heidelberg (2010)

    Google Scholar 

  • Cavallo, B., D’Apuzzo, L., Squillante, M.: About a consistency index for pairwise comparison matrices over a divisible alo-group. Int. J. Intell. Syst. 27(2), 153–175 (2012)

    Article  Google Scholar 

  • Chin, F.Y.: Security problems on inference control for sum, max, and min queries. J. ACM 33(3), 451–464 (1986)

    Article  Google Scholar 

  • CRISES: Unesco chair in data privacy. http://unescoprivacychair.urv.cat/presentacio.php (2007). Accessed 20 Dec 2012

  • Dalenius, T.: A simple procedure for controlled rounding. Statistik Tidskrift 3, 202–208 (1981)

    Google Scholar 

  • Denning, D.E.: Secure statistical databases with random sample queries. ACM Trans. Database Syst. 5(3), 291–315 (1980)

    Article  Google Scholar 

  • Denning, D.E., Denning, P.J., Schwartz, M.D.: The tracker: a threat to statistical database security. ACM Trans. Database Syst. 4(1), 76–96 (1979)

    Article  Google Scholar 

  • Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: Proceedings of the International Conference on Principles of Data Systems (PODS), pp. 202–210, (2003)

  • Dobkin, D.P., Jones, A.K., Lipton, R.J.: Secure databases: protection against user influence. ACM Trans. Database Syst. 4(1), 76–96 (1979)

    Article  Google Scholar 

  • Fellegi, I.P.: On the question of statistical confidentiality. J. Am. Stat. Assoc. 67(337), 7–18 (1972)

    Article  Google Scholar 

  • GIC: Group insurance commission testimony before the massachusetts health care committee (See Session of the Joint Committee on Health Care, Massachusetts State Legislature) (1997)

  • Heckerman, D.: Causal independence for knowledge acquisition and inference, pp. 122–127. In: Proceedings of Ninth Conference on Uncertainty in Artificial Intelligence, (1993)

  • IBM: Ibm privacy research institute. http://www.research.ibm.com/privacy/ (2001). Accessed 20 Dec 2012

  • Kenthapadi, K., Mishra, N., Nissim, K.: Simulatable auditing, In: PODS, pp. 118–127 (2005)

  • Kleinberg, J., Papadimitriou, C., Raghavan, P.: Auditing boolean attributes. J. Comput. Syst. Sci. 66(1), 244–253 (2003)

    Article  Google Scholar 

  • Malvestuto, F.M., Mezzini, M., Moscarini, M.: Auditing sum-queries to make a statistical database secure. ACM Trans. Inf. Syst. Secur. 9(1), 31–60 (2006)

    Article  Google Scholar 

  • Matloff, N.E.: Another look at the use of noise addition for database security, pp. 173–180. In: Proceedings of IEEE Symposium on Security and Privacy, (1986)

  • Nabar, S.U., Marthi, B., Kenthapadi, K., Mishra, N., Motwani, R.: Towards robustness in query auditing, pp. 151–162. In: International Conference on Very Large Data Bases (2006)

  • NAHDO, : A Guide to State-Level Ambulatory Care Data Collection Activities. National Association of Health Data Organizations (NAHDO), Falls Church (1996)

    Google Scholar 

  • Olesen, K., Kjaerulff, U., Jensen, F., Jensen, F., Falck, B., Andreassen, S., Andersen, S.: A munin network for the median nerve-a case study in loops. Appl. Artif. Intell. 3(2–3), 385–403 (1989)

    Article  Google Scholar 

  • Pearl, J.: Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, San Francisco (1998)

    Google Scholar 

  • PrivacyTrust: Privacy policy requirements. http://www.privacytrust.org/certification/privacy/privacy_requirements.html (2002). Accessed 20 December 2012

  • Saaty, T.L.: A scaling method for priorities in hierarchical structures. J. Math. Psychol. 15, 234–281 (1977)

    Article  Google Scholar 

  • Saaty, T.L.: The Analytic Hierarchy Process. McGraw-Hill, New York (1980)

    Google Scholar 

  • Saaty, T.L.: Axiomatic foundation of the analytic hierarchy process. Manag. Sci. 32(7), 841–855 (1986)

    Article  Google Scholar 

  • Saaty, T.L.: Decision Making for Leaders. University of Pittsburgh, Pittsburgh (1988)

    Google Scholar 

  • Saaty, T.L.: Decision making with the analytic hierarchy process. Int. J. Serv. Sci. 1(1), 83–98 (2008)

    Google Scholar 

  • Saaty, T.L., Zoffer, H.J.: Negotiating the israeli-palestinian controversy from a new perspective. Int. J. Inf. Technol. Decis. Mak. 10(1), 5–64 (2011)

    Article  Google Scholar 

  • Schlorer, J.: Identification and retrieval of personal records from a statistical bank. Methods Inform. Med. 14, 7–13 (1975)

    Google Scholar 

  • Srinivas, S.: A generalization of the noise-or-model, pp. 208–218. In: Ninth Annual Conference of Uncertainty on AI, 1993

  • Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowledge-Based Syst. 10(5), 557–570 (2002)

    Article  Google Scholar 

  • TR35-GI: Protezione della privacy dei dati mediante reti bayesiane. Technol. Rev. 2, 10 (2011)

    Google Scholar 

  • Traub, J.F., Yemini, Y., Wozniakowski, H.: The statistical security of a statistical database. ACM Trans. Database Syst. 9(4), 672–679 (1984)

    Article  Google Scholar 

  • Vargas, R.V.: Using the analytic hierarchy process (ahp) to select and prioritize projects in a portfolio. PMI Global Congress 2010 North America http://www.ricardo-vargas.com/wp-content/uploads/downloads/articles/ricardo_vargas_ahp_project_selection_en.pdf (2010). Accessed 20 December 2012

  • Warner, S.L.: Randomized response: a survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc. 60(309), 63–69 (1965)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bice Cavallo.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Cavallo, B., Canfora, G., D’Apuzzo, L. et al. Reasoning under uncertainty and multi-criteria decision making in data privacy. Qual Quant 48, 1957–1972 (2014). https://doi.org/10.1007/s11135-013-9859-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11135-013-9859-8

Keywords

Navigation