Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

IFIP Annual Conference on Data and Applications Security and Privacy

DBSec 2006: Data and Applications Security XX pp 30–43Cite as

  1. Home
  2. Data and Applications Security XX
  3. Conference paper
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation

On Finding an Inference-Proof Complete Database for Controlled Query Evaluation

  • Joachim Biskup18 &
  • Lena Wiese18 
  • Conference paper
  • 535 Accesses

  • 1 Citations

Part of the Lecture Notes in Computer Science book series (LNISA,volume 4127)

Abstract

Controlled Query Evaluation (CQE) offers a logical framework to prevent a user of a database from inadvertently gaining knowledge he is not allowed to know. By modeling the user’s a priori knowledge in an appropriate way, a CQE system can control not only plain access to database entries but also inferences made by the user. A dynamic CQE system that enforces inference control at runtime has already been investigated. In this article, we pursue a static approach that constructs an inference-proof database in a preprocessing step. The inference-proof database can respond to any query without enabling the user to infer confidential information. We illustrate the semantics of the system by a comprehensive example and state the essential requirements for an inference-proof and highly available database. We present an algorithm that accomplishes the preprocessing by combining SAT solving and “Branch and Bound”.

Keywords

  • Controlled Query Evaluation
  • inference control
  • lying
  • confidentiality of data
  • complete database systems
  • propositional logic
  • SAT solving
  • Branch and Bound

Chapter PDF

Download to read the full chapter text

References

  1. Biskup, J., Bonatti, P.A.: Lying versus refusal for known potential secrets. Data & Knowledge Engineering 38(2), 199–222 (2001)

    CrossRef  MATH  Google Scholar 

  2. Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. International Journal of Information Security 3(1), 14–27 (2004)

    CrossRef  Google Scholar 

  3. Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. Annals of Mathematics and Artificial Intelligence 40(1-2), 37–62 (2004)

    CrossRef  MathSciNet  MATH  Google Scholar 

  4. Biskup, J., Weibert, T.: Refusal in incomplete databases. In: Farkas, C., Samarati, P. (eds.) Proceedings of the 18th Annual IFIP WG 11.3 Conference on Data and Applications Security, Proceedings, pp. 143–157. Kluwer, Dordrecht (2004)

    Google Scholar 

  5. Chang, L., Moskowitz, I.S.: A study of inference problems in distributed databases. In: Gudes, E., Shenoi, S. (eds.) Proceedings of the 16th Annual IFIP WG 11.3 Conference on Data and Applications Security, pp. 191–204. Kluwer, Dordrecht (2002)

    Google Scholar 

  6. Davis, M., Logemann, G., Loveland, D.W.: A machine program for theorem-proving. Communications of the ACM 5(7), 394–397 (1962)

    CrossRef  MathSciNet  MATH  Google Scholar 

  7. Davis, M., Putnam, H.: A computing procedure for quantification theory. Journal of the ACM 7(3), 201–215 (1960)

    CrossRef  MathSciNet  MATH  Google Scholar 

  8. Delgrande, J.P., Schaub, T.: Two approaches to merging knowledge bases. In: Alferes, J.J., Leite, J. (eds.) JELIA 2004. LNCS, vol. 3229, pp. 426–438. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  9. Domingo-Ferrer, J. (ed.): Inference Control in Statistical Databases. LNCS, vol. 2316. Springer, Heidelberg (2002)

    MATH  Google Scholar 

  10. Eén, N., Biere, A.: Effective preprocessing in SAT through variable and clause elimination. In: Bacchus, F., Walsh, T. (eds.) SAT 2005. LNCS, vol. 3569, pp. 61–75. Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  11. Farkas, C., Jajodia, S.: The inference problem: A survey. SIGKDD Explorations 4(2), 6–11 (2002)

    CrossRef  Google Scholar 

  12. Frühwirth, T., Abdennadher, S.: Essentials of Constraint Programming. Springer, Heidelberg (2003)

    CrossRef  MATH  Google Scholar 

  13. Ganai, M.K., Ashar, P., Gupta, A., Zhang, L., Malik, S.: Combining strengths of circuit-based and CNF-based algorithms for a high-performance SAT solver. In: Proceedings of the 39th Design Automation Conference, pp. 747–750. ACM Press, New York (2002)

    Google Scholar 

  14. Giunchiglia, E., Sebastiani, R.: Applying the Davis-Putnam procedure to non-clausal formulas. In: Lamma, E., Mello, P. (eds.) AI*IA 1999. LNCS (LNAI), vol. 1792, pp. 84–94. Springer, Heidelberg (2000)

    CrossRef  Google Scholar 

  15. Hale, J., Shenoi, S.: Analyzing fd inference in relational databases. Data & Knowledge Engineering 18(2), 167–183 (1996)

    CrossRef  MATH  Google Scholar 

  16. Subbarayan, S., Pradhan, D.K.: Niver: Non increasing variable elimination resolution for preprocessing SAT instances. In: Hoos, H., Mitchell, D.G. (eds.) SAT 2004. LNCS, vol. 3542, pp. 276–291. Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  17. Thiffault, C., Bacchus, F., Walsh, T.: Solving non-clausal formulas with DPLL search. In: 7th International Conference on Theory and Applications of Satisfiability Testing, Online Proceedings (2004)

    Google Scholar 

  18. Wang, L., Li, Y., Wijesekera, D., Jajodia, S.: Precisely answering multi-dimensional range queries without privacy breaches. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 100–115. Springer, Heidelberg (2003)

    CrossRef  Google Scholar 

  19. Yang, X., Li, C.: Secure XML publishing without information leakage in the presence of data inference. In: Nascimento, M.A., Özsu, M.T., Kossmann, D., Miller, R.J., Blakeley, J.A., Schiefer, K.B. (eds.) Proceedings of the 30th International Conference on Very Large Data Bases, pp. 96–107. Morgan Kaufmann, San Francisco (2004)

    Google Scholar 

  20. Zhang, L.: On subsumption removal and on-the-fly CNF simplification. In: Bacchus, F., Walsh, T. (eds.) SAT 2005. LNCS, vol. 3569, pp. 482–489. Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  21. Zhang, L., Malik, S.: The quest for efficient boolean satisfiability solvers. In: Voronkov, A. (ed.) CADE 2002. LNCS, vol. 2392, pp. 295–313. Springer, Heidelberg (2002)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Universität Dortmund, 44221, Dortmund, Germany

    Joachim Biskup & Lena Wiese

Authors
  1. Joachim Biskup
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Lena Wiese
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Dipartimento di Tecnologie dell’Informazione, Università degli Studi di Milano, Italy

    Ernesto Damiani

  2. The Logistics Institute, Northeastern University, Shenyang, China

    Peng Liu

Rights and permissions

Reprints and Permissions

Copyright information

© 2006 IFIP International Federation for Information Processing

About this paper

Cite this paper

Biskup, J., Wiese, L. (2006). On Finding an Inference-Proof Complete Database for Controlled Query Evaluation. In: Damiani, E., Liu, P. (eds) Data and Applications Security XX. DBSec 2006. Lecture Notes in Computer Science, vol 4127. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11805588_3

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11805588_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-36796-3

  • Online ISBN: 978-3-540-36799-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature