Abstract
One of the central objectives of studying database privacy protection is to protect sensitive information held in a database from being inferred by a generic database user. In this paper, we present a framework to assist in the formal analysis of the database inference problem. The framework is based on an association network which is composed of a similarity measure and a Bayesian network model.
Chapter PDF
References
Anderson, R. (1998) “http://www.cl.cam.ac.uk/simrjal4/caldicott/caldicott.html”.
Chang, L. & Moskowitz, I. S. (1998) “Bayesian Methods Applied to the Database Inference Problem,” Database Security XII (ed. Jajodia), pp. 237–251, Kluwer.
Chang, L & Moskowitz, I. S. (2001) “Analysis of Database Inference,” in preparation.
Cowan, G. (1998) “Statistical Data Analysis,” Clarendon Press.
Duncan, G. (1995) “Restricted Data versus Restricted Access,” In Seminar on New Directions in Statistical Methodology, OMB, pp 43–56.
Denning, D. & Neumann, P. (1985) “Requirements and Model for IDES-A Real-Time Intrusion-Detection Expert System,” # 83F83-01-00 CS SRI International.
Freidman, J. (1996) “On Bias, Variance, 0&1 — Loss, and the Curse-of-Dimensionality,” Data Mining and Knowledge Discovery, 1, 55–77.
Heckerman D. (1996) “Bayesian Networks for Knowledge Discovery,” Advances in Knowledge Discovery and Data Mining, AAAI Press/MIT Press, pp. 273–305.
Hinke, T., Delugach, H. & Wolf, R. (1997) “Protecting Databases from Inference Attack,” Computers & Security, Vol. 16,No. 8, pp 687–708.
HIPAA (1999) The Health Insurance Portability and Accountability Act seminar, NY.
Iceland Database (1999) “http://www.decode.is/ppt/protection/index.htm”.
Kong, A., Liu, J. & Wong, W. (1994) “Sequential Imputation and Bayesian Missing Data Problems,” Journal of ASA, Vol. 89,No. 425, pp 278–288.
Lewis, P. (2000) book review “Losing Privacy in the Age of the Internet” (author Garfinkle) New York Times, Feb. 10, 2000.
Lin, T. Y., Hinke, T. H., Marks, D. G., & Thuraisingham, B. (1996) “Security and Data Mining,” Database Security Vol. 9: Status and Prospects, IFIP.
Marks, D. “Inference in MLS Database Systems,” IEEE Trans. KDE, V 8,# 1, pp46–55.
Moskowitz, I. S. & Chang, L. (2000) “A Computational Intelligence Approach to the Database Inference Problem,” Advances in Intelligent Systems: Theory and Applications (ed M. Mohammadian) IOS Press, 2000.
Office of Management and Budget (1994) “Report on Statistical Disclosure Limitation Methodology,” paper 22.
Pearl, J. (1989) “Probabilistic Reasoning in Intelligent Systems,” Morgan Kauffman.
Quinlan, R. (1992) “C4.5”, Morgan Kaufmann.
Sweeney, L. (1997) “Maintaining anonymity when sharing medical data,” MIT working paper, AIWP-WP344.
Thuraisingham, B. (1998) “Data Mining: Technologies, Tools and Trends:, CRC Press.
Zayatz, L. & Rowland, S. (1999) “Disclosure Limitation for American Factfinder,” Census Bureau report (manuscript).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Kluwer Academic Publishers
About this chapter
Cite this chapter
Chang, L., Moskowitz, I.S. (2002). An Integrated Framework for Database Privacy Protection. In: Thuraisingham, B., van de Riet, R., Dittrich, K.R., Tari, Z. (eds) Data and Application Security. IFIP International Federation for Information Processing, vol 73. Springer, Boston, MA. https://doi.org/10.1007/0-306-47008-X_15
Download citation
DOI: https://doi.org/10.1007/0-306-47008-X_15
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-7923-7514-2
Online ISBN: 978-0-306-47008-0
eBook Packages: Springer Book Archive