Skip to main content

Enforcing Confidentiality and Visibility Constraints

  • Chapter
Protecting Privacy in Data Release

Part of the book series: Advances in Information Security ((ADIS,volume 57))

  • 773 Accesses

Abstract

The most straightforward understanding of, and the first requirement for, protecting privacy when releasing a data collection is indeed the protection of the sensitive data included in the release. However, privacy protection should not prevent recipients from performing legitimate analysis on the released dataset, and should ensure adequate visibility over non sensitive information. In this chapter, we illustrate a solution allowing a data owner to publicly release a dataset while satisfying confidentiality and visibility constraints over the data, expressing requirements for information protection and release, respectively, by releasing vertical views (fragments) over the original dataset. We translate the problem of computing a fragmentation composed of the minimum number of fragments into the problem of computing a maximum weighted clique over a fragmentation graph. The fragmentation graph models fragments, efficiently computed using Ordered Binary Decision Diagrams (OBDDs), which satisfy all the confidentiality constraints and a subset of the visibility constraints defined in the system. To further enrich the utility of the released fragments, our solution complements them with loose associations (i.e., a sanitized form of the sensitive associations broken by fragmentation), specifically extended to safely operate on multiple fragments. We define an exact and a heuristic algorithm for computing a minimal and a locally minimal fragmentation, respectively, and a heuristic algorithm to efficiently compute a safe loose association among multiple fragments. We also prove the effectiveness of our proposals by means of extensive experimental evaluations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    We maintain such an assumption of the original proposal to avoid complicating the treatment with aspects not related to loose associations. Dependencies among attributes can be taken into consideration by extending the requirement of unlinkability among fragments to include the consideration of such dependencies (for more details, see [43]).

References

  1. G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, Y. Xu, Two can keep a secret: a distributed architecture for secure database services, in Proceedings of CIDR 2005, Asilomar, CA, 2005

    Google Scholar 

  2. R.E. Bryant, Graph-based algorithms for Boolean function manipulation. IEEE TC 35(8), 677–691 (1986)

    MATH  Google Scholar 

  3. V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, Keep a few: outsourcing data while maintaining confidentiality, in Proceedings of ESORICS 2009, Saint Malo, 2009

    Google Scholar 

  4. V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, Combining fragmentation and encryption to protect privacy in data storage. ACM TISSEC 13(3), 1–33 (2010)

    Article  Google Scholar 

  5. V. Ciriani, S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati. An OBDD approach to enforce confidentiality and visibility constraints in data publishing. JCS 20(5), 463–508 (2012)

    Google Scholar 

  6. S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, Fragments and loose associations: Respecting privacy in data publishing. PVLDB 3(1), 1370–1381 (2010)

    Google Scholar 

  7. S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati, Fragmentation in presence of data dependencies. IEEE TDSC 11(6), 510–523 (2014)

    Google Scholar 

  8. S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati, Loose associations to increase utility in data publishing. JCS 23(1), 59–88 (2015)

    Google Scholar 

  9. D.E. Knuth, The Art of Computer Programming, Volume 4, Fascicle 1: Bitwise Tricks & Techniques; Binary Decision Diagrams (Addison-Wesley Professional, Upper Saddle River, 2009)

    Google Scholar 

  10. C. Meinel, T. Theobald, Algorithms and Data Structures in VLSI Design (Springer, Berlin, 1998)

    Book  MATH  Google Scholar 

  11. Minnesota Population Center. IPMUS-USA (Integrated Public Use Microdata Series). http://www.ipums.org

    Google Scholar 

  12. P.R.J. Östergård, A new algorithm for the maximum-weight clique problem. Nordic J. Comput. 8, 424–436 (2001)

    MATH  MathSciNet  Google Scholar 

  13. P.R.J. Östergård, A fast algorithm for the maximum clique problem. Discret. Appl. Math. 120, 197–207 (2002)

    Article  MATH  Google Scholar 

  14. P. Samarati, Protecting respondents’ identities in microdata release. IEEE TKDE 13(6), 1010–1027 (2001)

    Google Scholar 

  15. F. Somenzi, Cudd: Cu decision diagram package – release 2.4.2, 2009. Department of Electrical and Computer Engineering – University of Colorado at Boulder

    Google Scholar 

  16. Ubuntu: Intel Q6600 one core – computer language benchmarks game. http://benchmarksgame.alioth.debian.org/u32/performance.php?test=nbody

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Livraga, G. (2015). Enforcing Confidentiality and Visibility Constraints. In: Protecting Privacy in Data Release. Advances in Information Security, vol 57. Springer, Cham. https://doi.org/10.1007/978-3-319-16109-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-16109-9_3

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-16108-2

  • Online ISBN: 978-3-319-16109-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics