Skip to main content

A Formal Model of Data Privacy

  • Conference paper
Perspectives of Systems Informatics (PSI 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4378))

Abstract

Information systems support data privacy by constraining user’s access to public views and thereby hiding the non-public underlying data. The privacy problem is to prove that none of the private data can be inferred from the information which is made public. We present a formal definition of the privacy problem which is based on the notion of certain answer. Then we investigate the privacy problem in the contexts of relational databases and ontology based information systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., et al.: Hippocratic databases. In: Proc. of 28th VLDB Conference (2002)

    Google Scholar 

  2. Arenas, M., Libkin, L.: XML data exchange: Consistency and query answering. In: PODS, pp. 13–24 (2005)

    Google Scholar 

  3. Baader, F., et al.: The Description Logic Handbook. Cambridge University Press, Cambridge (2003)

    MATH  Google Scholar 

  4. Beeri, C., Vardi, M.Y.: A proof procedure for data dependencies. Journal of the ACM 31(4), 718–741 (1984)

    Article  MATH  MathSciNet  Google Scholar 

  5. Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. International Journal of Information Security 3(1), 14–27 (2004)

    Article  MathSciNet  Google Scholar 

  6. Bonatti, P.A., Kraus, S., Subrahmanian, V.s.: Foundations of secure deductive databases. Transactions on Knowledge and Data Engineering 7(3), 406–422 (1995), doi:10.1109/69.390247

    Article  Google Scholar 

  7. Calì, A., et al.: Data integration under integrity constraints. In: Pidduck, A.B., et al. (eds.) CAiSE 2002. LNCS, vol. 2348, pp. 262–279. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  8. Council of Europe: Convention for the protection of individuals with regard to automatic processing of personal data (1981), Available at http://conventions.coe.int/Treaty/en/Treaties/Html/108.htm

  9. Cuenca Grau, B., et al.: Automated partitioning of owl ontologies using e-connections. In: Proceedings of Int. Workshop on Description Logics (2005)

    Google Scholar 

  10. Damiani, E., et al.: Controlling access to XML documents. IEEE Internet Computing 5(6), 18–28 (2001)

    Article  Google Scholar 

  11. Papakonstantinou, Y., Deutsch, A.: Privacy in Database Publishing. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, vol. 3363, pp. 230–245. Springer, Heidelberg (2004)

    Google Scholar 

  12. Dix, J., Subrahmanian, V.S., Faber, W.: The Relationship Between Reasoning About Privacy and Default Logics. In: Sutcliffe, G., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), vol. 3835, pp. 637–650. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  13. Fagin, R., Kolaitis, P.G.: Data exchange: Semantics and query answering. Theoretical Computer Science 336, 89–124 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  14. Halevy, A.Y.: Answering queries using views: A survey. The VLDB Journal 10(4), 270–294 (2001), doi:10.1007/s007780100054

    Article  MATH  Google Scholar 

  15. Kutz, O., et al.: E-connections of abstract description systems. Artifical Intelligence 156(1), 1–73 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  16. Lenzerini, M.: Data integration: a theoretical perspective. In: ACM PODS ’02, Madison, Wisconsin, pp. 233–246. ACM Press, New York (2002), doi:10.1145/543613.543644

    Chapter  Google Scholar 

  17. Machanavajjhala, A., Gehrke, J.: On the efficiency of checking perfect privacy. To appear in Proceedings of PODS (2006)

    Google Scholar 

  18. Miklau, G., Suciu, D.: A formal analysis of information disclosure in data exchange. In: SIGMOD (2004)

    Google Scholar 

  19. OECD: Guidelines on the protection of privacy and transborder flows of personal data (1980), Available at http://www.oecd.org

  20. Privacy International. Overview of privacy (2004), Available at http://www.privacyinternational.org/privhroverview2004

  21. Reiter, R.: Towards a logical reconstruction of relational database theory. In: Brodie, M.L., Mylopoulos, J., Schmidt, J.W. (eds.) On Conceptual Modelling, Perspectives from Artificial Intelligence, Databases, and Programming Languages, pp. 191–233 (1982)

    Google Scholar 

  22. Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information (abstract). In: PODS, p. 188. ACM Press, New York (1998)

    Google Scholar 

  23. Stoffel, K., Studer, T.: Provable data privacy. In: Andersen, K.V., Debenham, J., Wagner, R. (eds.) DEXA 2005. LNCS, vol. 3588, pp. 324–332. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  24. van der Meyden, R.: Logical approaches to incomplete information: a survey. In: Logics for databases and information systems, pp. 307–356. Kluwer Academic Publishers, Dordrecht (1998)

    Google Scholar 

  25. Winslett, M., Smith, K., Qian, X.: Formal query languages for secure relational databases. ACM Trans. Database Syst. 19(4), 626–662 (1994), doi:10.1145/195664.195675

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Irina Virbitskaite Andrei Voronkov

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Stouppa, P., Studer, T. (2007). A Formal Model of Data Privacy. In: Virbitskaite, I., Voronkov, A. (eds) Perspectives of Systems Informatics. PSI 2006. Lecture Notes in Computer Science, vol 4378. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70881-0_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-70881-0_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-70880-3

  • Online ISBN: 978-3-540-70881-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics