Summary
We present a unifying perspective of privacy guarantees in view-based and generalization-based publishing. This perspective uses a generic Bayesian privacy model which generalizes both types of publishing scenarios and allows us to relate seemingly disparate privacy guarantees found in the literature.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Serge Abiteboul, Richard Hull, and Victor Vianu. Foundations of Databases. Addison-Wesley, 1995.
Charu C. Aggarwal. On randomization, public information and the curse of dimensionality. In International Conference on Data Engineering (ICDE), pages 136–145, 2007.
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Anonymizing tables. In International Conference on Database Theory (ICDT), pages 246–258, 2005.
C. C. Aggrawal. On k-anonymity and the curse of dimensionality. In International Conference on Very Large Data Bases (VLDB), pages 901–909, 2005.
Francois Bancilhon and Nicolas Spyratos. Protection of information in relational data bases. In International Conference on Very Large Data Bases (VLDB), pages 494–500, 1977.
Francois Bancilhon and Nicolas Spyratos. Algebraic versus probabilistic independence in data bases. In ACM Symposium on Principles of Database Systems (PODS), pages 149–153, 1985.
R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In International Conference on Data Engineering (ICDE), pages 217–228, 2005.
Alin Deutsch and Yannis Papakonstantinou. Privacy in database publishing. In International Conference on Database Theory (ICDT), pages 230–245, 2005.
Alin Deutsch and Val Tannen. Reformulation of XML queries and constraints. In International Conference on Database Theory (ICDT), 2003.
R. Fagin, P. Kolaitis, R. Miller, and L. Popa. Data exchange: Semantics and query answering. In International Conference on Database Theory (ICDT), 2003.
Alon Halevy. Answering queries using views: A survey. VLDB Journal, 10(4):270–294, 2001.
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Incognito: E?cient fulldomain k-anonymity. In ACM Conference on Management of Data (SIGMOD), pages 49–60, 2005.
Maurizio Lenzerini. Data integration: A theoretical perspective. In ACM Symposium on Principles of Database Systems (PODS), 2002.
Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In International Conference on Data Engineering (ICDE), 2007.
Ashwin Machanavajjhala and Johannes Gehrke. On the e?ciency of checking perfect privacy. In ACM Symposium on Principles of Database Systems (PODS), pages 163–172, 2006.
Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, and Muthuramakrishnan Venkatasubramaniam. l-diversity: Privacy beyond k-anonymity. In International Conference on Data Engineering (ICDE), page 24, 2006.
Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, and Muthuramakrishnan Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. To appear in IEEE Transactions on Knowledge and Data Engineering (TKDE).
A. Meyerson and R.Williams. On the complexity of optimal k-anonymity. In ACM Symposium on Principles of Database Systems (PODS), pages 223–228, 2004.
Gerome Miklau and Dan Suciu. A formal analysis of information disclosure in data exchange. In ACM Conference on Management of Data (SIGMOD), pages 575–586, 2004.
Gerome Miklau and Dan Suciu. A formal analysis of information disclosure in data exchange. Journal of Computer and Systems Sciences, 73(3):507–534, 2007.
Alan Nash and Alin Deutsch. Privacy in GLAV information integration. In International Conference on Database Theory (ICDT), pages 89–103, 2007.
Pierangela Samarati. Protecting respondents’ identities in microdata release. IEEE Transactions on Knowledge and Data Engineering (TKDE), 13(6):1010– 1027, 2001.
Pierangela Samarati and Latanya Sweeney. Generalizing data to provide anonymity when disclosing information. In ACM Symposium on Principles of Database Systems (PODS), page 188, 1998.
Latanya Sweeney. k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness, and Knowlege-Based Systems, 10(5):557– 570, 2002.
Chao Yao, Xiaoyang Sean Wang, and Sushil Jajodia. Checking for k-anonymity violation by views. In International Conference on Very Large Data Bases (VLDB), pages 910–921, 2005.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media, LLC.
About this chapter
Cite this chapter
Deutsch, A. (2008). Privacy in Database Publishing: A Bayesian Perspective. In: Gertz, M., Jajodia, S. (eds) Handbook of Database Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-48533-1_19
Download citation
DOI: https://doi.org/10.1007/978-0-387-48533-1_19
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-48532-4
Online ISBN: 978-0-387-48533-1
eBook Packages: Computer ScienceComputer Science (R0)