Abstract
Data sharing and information exchange have grown exponentially with the information explosion in the last few years. More and more data are being shared among different types of users residing in different places, performing different kinds of tasks for different kinds of applications. Privacy control is a major issue for today’s data managers. In this research, we presented two models to solve the information leakage problem occurring during query aggregation. The first model is the base model that uses a single inference dispersion value for each user where as the second model uses multiple inference dispersion values for each user with a view to provide more accessibility.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, R.: An integrated Survey of Medical Databases (1998), http://www.clcam.ac.uk/simrja14/caldicott/caldicott.html
Burns, R.K.: Integrity and Secracy: Fundamental Conflicts in the Database Environment. In: Proceedings of the Third RADC Database Security Workshop, pp. 37–40 (1990)
Chang, L.W., Mokowitz, I.: A Study of Inference Problems in Distributed Databases. In: Research Directions in Data and Applications Security, 16th Annual Edition, pp. 191–204
Chen, Y., Chu, W.: Database Security Protection via Inference Detection, Computer Science Department, University of California, Los Angeles, CA, USA
Hinke, T.H.: Inference Aggregation Detection in Database Management Systems. In: First IEEE Computer Security Foundations Workshop (1988)
Jajodia, S., Meadows, C.: Inference Problems in Multilevel Secure Database Management Systems. In: Abrams, M. (ed.) Information Security and Collection of Essays, IEEE Press, Los Alamitos (1995)
Meadows, C., Jajodia, S.: Integrity versus Security in Multilevel Secure Databases. In: Database Security: Status and Prospects (1988)
Morgernstern, M.: Security and Inference in Multilevel Database and Knowledge-Base Systems. SRI International Computer Science Laboratory, Menlo Park, CA (1987)
Simpson, A., Power, D., Slaymaker, M.: On Tracker Attacks in Health Grids. In: Proceedings of the 2006 ACM Symposium on Applied Computing, Dijon, France (April 2006)
Thuraisingham, B.: Recursion Theoritic Properties of the Inference Problem. In: Third IEEE Computer Security Foundations Workshop (1990)
Qian, X., Stickel, M., Karp, P., Lunt, T., Garvey, T.: Detection and Elimination of Inference Channels in Multilevel Relational Database Systems. In: IEEE Symposium on Security and Privacy (1993)
Yip, R.W., Levitt, K.N.: Data Level Inference Detection in Database Systeme. Department of Computer Science, University of California, Davis, CA, USA (1998)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Konduri, S., Panda, B., Li, WN. (2007). Monitoring Information Leakage During Query Aggregation. In: Janowski, T., Mohanty, H. (eds) Distributed Computing and Internet Technology. ICDCIT 2007. Lecture Notes in Computer Science, vol 4882. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77115-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-77115-9_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77112-8
Online ISBN: 978-3-540-77115-9
eBook Packages: Computer ScienceComputer Science (R0)