Skip to main content

Privacy in Database Publishing: A Bayesian Perspective

  • Chapter

Summary

We present a unifying perspective of privacy guarantees in view-based and generalization-based publishing. This perspective uses a generic Bayesian privacy model which generalizes both types of publishing scenarios and allows us to relate seemingly disparate privacy guarantees found in the literature.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   89.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Serge Abiteboul, Richard Hull, and Victor Vianu. Foundations of Databases. Addison-Wesley, 1995.

    Google Scholar 

  2. Charu C. Aggarwal. On randomization, public information and the curse of dimensionality. In International Conference on Data Engineering (ICDE), pages 136–145, 2007.

    Google Scholar 

  3. G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Anonymizing tables. In International Conference on Database Theory (ICDT), pages 246–258, 2005.

    Google Scholar 

  4. C. C. Aggrawal. On k-anonymity and the curse of dimensionality. In International Conference on Very Large Data Bases (VLDB), pages 901–909, 2005.

    Google Scholar 

  5. Francois Bancilhon and Nicolas Spyratos. Protection of information in relational data bases. In International Conference on Very Large Data Bases (VLDB), pages 494–500, 1977.

    Google Scholar 

  6. Francois Bancilhon and Nicolas Spyratos. Algebraic versus probabilistic independence in data bases. In ACM Symposium on Principles of Database Systems (PODS), pages 149–153, 1985.

    Google Scholar 

  7. R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In International Conference on Data Engineering (ICDE), pages 217–228, 2005.

    Google Scholar 

  8. Alin Deutsch and Yannis Papakonstantinou. Privacy in database publishing. In International Conference on Database Theory (ICDT), pages 230–245, 2005.

    Google Scholar 

  9. Alin Deutsch and Val Tannen. Reformulation of XML queries and constraints. In International Conference on Database Theory (ICDT), 2003.

    Google Scholar 

  10. R. Fagin, P. Kolaitis, R. Miller, and L. Popa. Data exchange: Semantics and query answering. In International Conference on Database Theory (ICDT), 2003.

    Google Scholar 

  11. Alon Halevy. Answering queries using views: A survey. VLDB Journal, 10(4):270–294, 2001.

    Article  Google Scholar 

  12. K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Incognito: E?cient fulldomain k-anonymity. In ACM Conference on Management of Data (SIGMOD), pages 49–60, 2005.

    Google Scholar 

  13. Maurizio Lenzerini. Data integration: A theoretical perspective. In ACM Symposium on Principles of Database Systems (PODS), 2002.

    Google Scholar 

  14. Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In International Conference on Data Engineering (ICDE), 2007.

    Google Scholar 

  15. Ashwin Machanavajjhala and Johannes Gehrke. On the e?ciency of checking perfect privacy. In ACM Symposium on Principles of Database Systems (PODS), pages 163–172, 2006.

    Google Scholar 

  16. Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, and Muthuramakrishnan Venkatasubramaniam. l-diversity: Privacy beyond k-anonymity. In International Conference on Data Engineering (ICDE), page 24, 2006.

    Google Scholar 

  17. Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, and Muthuramakrishnan Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. To appear in IEEE Transactions on Knowledge and Data Engineering (TKDE).

    Google Scholar 

  18. A. Meyerson and R.Williams. On the complexity of optimal k-anonymity. In ACM Symposium on Principles of Database Systems (PODS), pages 223–228, 2004.

    Google Scholar 

  19. Gerome Miklau and Dan Suciu. A formal analysis of information disclosure in data exchange. In ACM Conference on Management of Data (SIGMOD), pages 575–586, 2004.

    Google Scholar 

  20. Gerome Miklau and Dan Suciu. A formal analysis of information disclosure in data exchange. Journal of Computer and Systems Sciences, 73(3):507–534, 2007.

    Article  MATH  Google Scholar 

  21. Alan Nash and Alin Deutsch. Privacy in GLAV information integration. In International Conference on Database Theory (ICDT), pages 89–103, 2007.

    Google Scholar 

  22. Pierangela Samarati. Protecting respondents’ identities in microdata release. IEEE Transactions on Knowledge and Data Engineering (TKDE), 13(6):1010– 1027, 2001.

    Article  Google Scholar 

  23. Pierangela Samarati and Latanya Sweeney. Generalizing data to provide anonymity when disclosing information. In ACM Symposium on Principles of Database Systems (PODS), page 188, 1998.

    Google Scholar 

  24. Latanya Sweeney. k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness, and Knowlege-Based Systems, 10(5):557– 570, 2002.

    Article  MATH  Google Scholar 

  25. Chao Yao, Xiaoyang Sean Wang, and Sushil Jajodia. Checking for k-anonymity violation by views. In International Conference on Very Large Data Bases (VLDB), pages 910–921, 2005.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media, LLC.

About this chapter

Cite this chapter

Deutsch, A. (2008). Privacy in Database Publishing: A Bayesian Perspective. In: Gertz, M., Jajodia, S. (eds) Handbook of Database Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-48533-1_19

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-48533-1_19

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-48532-4

  • Online ISBN: 978-0-387-48533-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics