Preventing Interval-Based Inference by Random Data Perturbation

  • Yingjiu Li
  • Lingyu Wang
  • Sushil Jajodia
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2482)


Random data perturbation (RDP) method is often used in statistical databases to prevent inference of sensitive information about individuals from legitimate sum queries. In this paper, we study the RDP method for preventing an important type of inference: interval-based inference. In terms of interval-based inference, the sensitive information about individuals is said to be compromised if an accurate enough interval, called inference interval, is obtained into which the value of the sensitive information must fall. We show that the RDP methods proposed in the literature are not effective for preventing such interval-based inference. Based on a new type of random distribution, called ∊-Gaussian distribution, we propose a new RDP method to guarantee no interval-based inference.


Statistical Inference Random Noise Tolerance Level Sensitive Information Random Perturbation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    A. L. Abul-Ela, B.G. Greenberg, and D.G. Horvitz. A multi-proportions randomized response model. Journal of American Statistical Association, 62(319):990–1008, 1967.CrossRefMathSciNetGoogle Scholar
  2. 2.
    N.R. Adam and J.C. Wortmann. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys, 21(4):515–556, 1989.CrossRefGoogle Scholar
  3. 3.
    D.E. Denning. Are statistical data bases secure? In AFIPS conference proceedings, volume 47, pages 199–204, 1978.Google Scholar
  4. 4.
    D.E. Denning and P.J. Denning. Data security. ACM computing surveys, 11(3):227–249, 1979.CrossRefGoogle Scholar
  5. 5.
    D.E. Denning and J. Schlörer. Inference controls for statistical databases. IEEE Computer, 16(7):69–82, 1983.Google Scholar
  6. 6.
    R. Fourer. Linear programming frequently asked questions. Optimization Technology Center of Northwestern University and Argonne National Laboratory, 2001.
  7. 7.
    N. Matloff. Another look at the use of noise addition for database security. In Proceedings of the 1986 IEEE Symposium on Security and Privacy, pages 173–180, 1986.Google Scholar
  8. 8.
    K. Muralidhar and R. Sarathy. Security of random data perturbation methods. A CM Trans. on Database Systems, 24(4):487–493, 1999.CrossRefGoogle Scholar
  9. 9.
    M.A. Palley. Security of statistical databases compromise through attribute correlational modeling. In Proc. of IEEE Conference on Data Engineering, pages 67–74, 1986.Google Scholar
  10. 10.
    P. Tendick and N. Matloff. A modified random perturbation method for database security. A CM Trans. on Database Systems, 19(1):47–63, 1994.CrossRefGoogle Scholar
  11. 11.
    J.F. Traub, Y. Yemini, and H. Woźniakowski. The statistical security of a statistical database. A CM Trans. on Database Systems, 9(4):672–679, 1984.CrossRefGoogle Scholar
  12. 12.
    S.L. Warner. A survey technique for eliminating evasive answer bias. Journal of American Statistical Association, 60(309):63–69, 1965.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Yingjiu Li
    • 1
  • Lingyu Wang
    • 1
  • Sushil Jajodia
    • 1
  1. 1.Center for Secure Information SystemsGeorge Mason UniversityFairfaxUSA

Personalised recommendations