Abstract
The most straightforward understanding of, and the first requirement for, protecting privacy when releasing a data collection is indeed the protection of the sensitive data included in the release. However, privacy protection should not prevent recipients from performing legitimate analysis on the released dataset, and should ensure adequate visibility over non sensitive information. In this chapter, we illustrate a solution allowing a data owner to publicly release a dataset while satisfying confidentiality and visibility constraints over the data, expressing requirements for information protection and release, respectively, by releasing vertical views (fragments) over the original dataset. We translate the problem of computing a fragmentation composed of the minimum number of fragments into the problem of computing a maximum weighted clique over a fragmentation graph. The fragmentation graph models fragments, efficiently computed using Ordered Binary Decision Diagrams (OBDDs), which satisfy all the confidentiality constraints and a subset of the visibility constraints defined in the system. To further enrich the utility of the released fragments, our solution complements them with loose associations (i.e., a sanitized form of the sensitive associations broken by fragmentation), specifically extended to safely operate on multiple fragments. We define an exact and a heuristic algorithm for computing a minimal and a locally minimal fragmentation, respectively, and a heuristic algorithm to efficiently compute a safe loose association among multiple fragments. We also prove the effectiveness of our proposals by means of extensive experimental evaluations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
We maintain such an assumption of the original proposal to avoid complicating the treatment with aspects not related to loose associations. Dependencies among attributes can be taken into consideration by extending the requirement of unlinkability among fragments to include the consideration of such dependencies (for more details, see [43]).
References
G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, Y. Xu, Two can keep a secret: a distributed architecture for secure database services, in Proceedings of CIDR 2005, Asilomar, CA, 2005
R.E. Bryant, Graph-based algorithms for Boolean function manipulation. IEEE TC 35(8), 677–691 (1986)
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, Keep a few: outsourcing data while maintaining confidentiality, in Proceedings of ESORICS 2009, Saint Malo, 2009
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, Combining fragmentation and encryption to protect privacy in data storage. ACM TISSEC 13(3), 1–33 (2010)
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati. An OBDD approach to enforce confidentiality and visibility constraints in data publishing. JCS 20(5), 463–508 (2012)
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, Fragments and loose associations: Respecting privacy in data publishing. PVLDB 3(1), 1370–1381 (2010)
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati, Fragmentation in presence of data dependencies. IEEE TDSC 11(6), 510–523 (2014)
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati, Loose associations to increase utility in data publishing. JCS 23(1), 59–88 (2015)
D.E. Knuth, The Art of Computer Programming, Volume 4, Fascicle 1: Bitwise Tricks & Techniques; Binary Decision Diagrams (Addison-Wesley Professional, Upper Saddle River, 2009)
C. Meinel, T. Theobald, Algorithms and Data Structures in VLSI Design (Springer, Berlin, 1998)
Minnesota Population Center. IPMUS-USA (Integrated Public Use Microdata Series). http://www.ipums.org
P.R.J. Östergård, A new algorithm for the maximum-weight clique problem. Nordic J. Comput. 8, 424–436 (2001)
P.R.J. Östergård, A fast algorithm for the maximum clique problem. Discret. Appl. Math. 120, 197–207 (2002)
P. Samarati, Protecting respondents’ identities in microdata release. IEEE TKDE 13(6), 1010–1027 (2001)
F. Somenzi, Cudd: Cu decision diagram package – release 2.4.2, 2009. Department of Electrical and Computer Engineering – University of Colorado at Boulder
Ubuntu: Intel Q6600 one core – computer language benchmarks game. http://benchmarksgame.alioth.debian.org/u32/performance.php?test=nbody
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Livraga, G. (2015). Enforcing Confidentiality and Visibility Constraints. In: Protecting Privacy in Data Release. Advances in Information Security, vol 57. Springer, Cham. https://doi.org/10.1007/978-3-319-16109-9_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-16109-9_3
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-16108-2
Online ISBN: 978-3-319-16109-9
eBook Packages: Computer ScienceComputer Science (R0)