Abstract
A query on the distribution of a sensitive field within a selected population in a database can be submitted to the data center, and the answer to this query can leak private information, even though no identification information is provided. Inspired by decision theory, we present a quantitative model of the privacy protection problem in such a database query environment. In our model, the user information states are defined as classes of probability distributions on the set of possible confidential values. These states can be modified and refined by knowledge acquisition actions. The data confidentiality is guaranteed by ensuring that misusing private information is more costly than any possible gain.
Chapter PDF
References
L.J. Camp. Trust and Risk in Internet Commerce. The MIT Press, 2000.
Y.C. Chiang, T.-s. Hsu, S. Kuo, C.J. Liau, and D.W. Wang. Preserving confidentiality when sharing medical database with the Cellsecu system. International Journal of Medical Informatics, 71:17–23, 2003.
Y.C. Chiang, T.-s. Hsu, S. Kuo, and D.W. Wang. Preserving confidentially when sharing medical data. In Proceedings of Asia Pacific Medical Informatics Conference, 2000.
Y.T. Chiang, Y.C. Chiang, T.-s. Hsu, C.J. Liau, and D.W. Wang. How much privacy?-a system to safe guard personal privacy while releasing database. In Proceedings of the 3rd International Conference on Rough Sets and Current Trends in Computing, LNCS 2475, pages 226–233. Springer-Verlag, 2002.
G.D. Eppen and F.J. Gould. Quantitative Concepts for Management. Prentice Hall, 1985.
T.-s. Hsu, C.J. Liau, and D.W. Wang. A logical model for privacy protection. In Proceedings of the 4th International Conference on Information Security, LNCS 2200, pages 110–124. Springer-Verlag, 2001.
T.-s. Hsu, C.J. Liau, D.W. Wang, and Jeremy K.P. Chen. Quantifying privacy leakage through answering database queries. In Proceedings of the 5th International Conference on Information Security, LNCS 2433, pages 162–175. Springer-Verlag, 2002.
A.J. Hundepool and L.C.R.J. Willenborg. “μ-and τ-ARGUS: Software for statistical disclosure control”. In Proceedings of the 3rd International Seminar on Statistical Confidentiality, 1996.
J. Kleinberg, C.H. Papadimitriou, and P. Raghavan. “On the value ofprivate information”. In Proc. 8th Conf. on Theoretical Aspects of Rationality and Knowledge, 2001.
D.V. Lindley. Making Decisions. John Wiley & Sons, 1985.
A. Ohrn and L. Ohno-Machado. “Using Boolean reasoning to anonymize databases”. Artificial Intelligence in Medicine, 15:235–254, 1999.
Z. Pawlak. Rough Sets-Theoretical Aspects of Reasoning about Data. Kluwer Academic Publishers, 1991.
P. Samarati. “Protecting respondents’ identities in microdata release”. IEEE Transactions on Knowledge and Data Engineering, 13(6):1010–1027, 2001.
L. Sweeney. “Guaranteeing anonymity when sharing medical data, the Datafly system”. In Proceedings of American Medical Informatics Association, 1997.
L. Sweeney. “Achieving k -Anonymity privacy protection using generalization and suppression”. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, 10(5):571–588, 2002.
L. Sweeney. “k -Anonymity: A model for protecting privacy”. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, 10(5):557–570, 2002.
D.W. Wang, C.J. Liau, and T.-s. Hsu. “Medical privacy protection based on granular computing”. Artificial Intelligence in Medicine, to appear, 2004.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science + Business Media, Inc.
About this paper
Cite this paper
Wang, DW., Liau, CJ., Hsu, Ts., Chen, J.KP. (2004). On the Damage and Compensation of Privacy Leakage. In: Farkas, C., Samarati, P. (eds) Research Directions in Data and Applications Security XVIII. IFIP International Federation for Information Processing, vol 144. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8128-6_21
Download citation
DOI: https://doi.org/10.1007/1-4020-8128-6_21
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-8127-9
Online ISBN: 978-1-4020-8128-6
eBook Packages: Springer Book Archive