Skip to main content
Log in

Controlled Query Evaluation for Known Policies by Combining Lying and Refusal

  • Published:
Annals of Mathematics and Artificial Intelligence Aims and scope Submit manuscript

Abstract

Controlled query evaluation enforces security policies for confidentiality in information systems. It deals with users who may apply background knowledge to infer additional information from the answers to their queries. For each query the correct answer is first judged by some censor and then – if necessary – appropriately modified to preserve security. In previous approaches, modification has been done uniformly, either by lying or by refusal. A drawback of lying is that all disjunctions of secrets must always be protected. On the other hand, refusal may hide an answer even when the correct answer does not immediately reveal a secret. In this paper we introduce a hybrid answer modification method that appropriately combines lying and refusal. We prove that the new method is secure under the models of known potential secrets and of known secrecies, respectively. Furthermore, we demonstrate that the combined approach can be more cooperative than uniform lying and uniform refusal, and enjoys the advantages of both.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. J. Biskup, For unknown secrecies refusal is better than lying, Data and Knowledge Engineering 33 (2000) 1–23.

    Google Scholar 

  2. J. Biskup and P.A. Bonatti, Lying versus refusal for known potential secrets, Data and Knowledge Engineering 38 (2001) 199–222.

    Google Scholar 

  3. J. Biskup and P.A. Bonatti, Confidentiality policies and their enforcement for controlled query evaluation, in: Proc. of ESORICS 2002, Lecture Notes in Computer Science, Vol. 2502 (Springer, New York, 2002) pp. 39–54.

    Google Scholar 

  4. P.A. Bonatti, S. Kraus and V.S. Subrahmanian, Foundations of secure deductive databases, IEEE Transactions on Knowledge and Data Engineering 7(3) (1995) 406–422.

    Google Scholar 

  5. S. Dawson, S. De Capitani di Vimercati, P. Lincoln and P. Samarati, Minimal data upgrading to prevent inference and association attacks, in: Proc. of the 18th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS) (1999) pp. 114–125.

  6. J.W. Lloyd, Foundations of Logic Programming (Springer, Berlin, 1987).

    Google Scholar 

  7. X. Quian, View-based access control with high assurance, in: Proc. of the 1996 IEEE Symposium on Security and Privacy (1996) pp. 85–93.

  8. J.R. Shoenfield, Mathematical Logic (Addison-Wesley, Reading, MA, 1967).

    Google Scholar 

  9. G.L. Sicherman, W. de Jonge and R.P. van de Riet, Answering queries without revealing secrets, ACM Transactions on Database Systems 8(1) (1983) 41–59.

    Google Scholar 

  10. M.E. Stickel, Elimination of inference channels by optimal upgrading, in: Proc. of the 1994 IEEE Symposium on Security and Privacy (1994) pp. 168–174.

  11. T.A. Su and G. Ozsoyoglu, Controlling FD and MVD inferences in multilevel relational database systems, IEEE Transactions on Knowledge and Data Engineering 3(4) (1991) 474–485.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Biskup, J., Bonatti, P.A. Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. Annals of Mathematics and Artificial Intelligence 40, 37–62 (2004). https://doi.org/10.1023/A:1026106029043

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1026106029043

Navigation