Abstract
By means of an integration of decision theory and probabilistic models, we explore and develop methods for improving data privacy. Our work encompasses disclosure control tools in statistical databases and privacy requirements prioritization; in particular we propose a Bayesian approach for the on-line auditing in Statistical Databases and Pairwise Comparison Matrices for privacy requirements prioritization. The first approach is illustrated by means of examples in the context of statistical analysis on the census and medical data, where no salary (resp. no medical information), that could be related to a specific employee (resp. patient), must be released; the second approach is illustrated by means of examples, such as an e-voting system and an e-banking service that have to satisfy privacy requirements in addition to functional and security ones. Several fields in the social sciences, economics and engineering will benefit from the advances in this research area: e-voting, e-government, e-commerce, e-banking, e-health, cloud computing and risk management are a few examples of applications for the findings of this research.
Similar content being viewed by others
References
Adam, N.R., Wortmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Comput. Surv. 21(4), 515–556 (1989)
Barzilai, J.: Consistency measures for pairwise comparison matrices. J. Multi-Criteria Decis. Anal. 7, 123–132 (1998)
Basile, L., D’Apuzzo, L.: Weak consistency and quasi-linear means imply the actual ranking. Int. J. Uncertain. Fuzziness Knowledge-Based Syst. 10(3), 227–239 (2002)
Beck, L.L.: A security mechanism for statistical databases. ACM Trans. Database Syst. 5(3), 316–338 (1980)
Bijwe, A., Mead, N.R.: Adapting the square process for privacy requirements engineering. Software Engineering Institute, Carnegie Mellon University, Tech. Rep. (2010)
Blum, A., Dwork, C., Mcsherry, F., Nissim, K.: Practical privacy: The sulq framework. In: Proceedings of the International Conference on Principles of Data Systems (PODS), (2005)
Cambridge: Cambridge voters list database City of Cambridge, Massachusetts (1997)
Canfora, G., Cavallo, B.: A bayesian approach for on-line max and min auditing, pp. 12–20. In: Proocedings of International Workshop on Privacy and Anonymity in Information Society (PAIS), ACM DL, (2008a)
Canfora, G., Cavallo, B.: A bayesian approach for on-line max auditing, pp. 1020–1027. In: Proocedings of The 3rd International Conference on Availability, Reliability and Security (ARES), IEEE Computer Society Press, (2008b)
Canfora, G., Cavallo, B.: Reasoning under uncertainty in on-line auditing. In: Domingo-Ferrer, J., Saygin, Y. (eds.) Privacy in Statistical Databases. Lecture Notes in Computer Science, vol. 5262, pp. 257–269. Springer, Heidelberg (2008c)
Canfora, G., Cavallo, B.: A bayesian approach for on-line max auditing of dynamic statistical databases, In: EDBT/ICDT Workshops, pp. 107–116 (2009a)
Canfora, G., Cavallo, B.: A bayesian model for disclosure control in statistical databases. Data Knowl. Eng. 68(11), 1187–1205 (2009b)
Canfora, G., Cavallo, B.: A probabilistic approach for on-line sum-auditing, In: ARES, pp. 303–308 (2010)
Cavallo, B.: Metodi, modelli e tecnologie per la data privacy. ZeroUno 353, 90–93 (2011)
Cavallo, B., Canfora, G.: A bayesian approach for on-line sum/count/max/min auditing on boolean data. In: Domingo-Ferrer, J., Tinnirello, I. (eds.) Privacy in Statistical Databases. Lecture Notes in Computer Science, pp. 295–307. Springer, Heidelberg (2012)
Cavallo, B., D’Apuzzo, L.: A general unified framework for pairwise comparison matrices in multicriterial methods. Int. J. Intell. Syst. 24(4), 377–398 (2009a)
Cavallo, B., D’Apuzzo, L.: Transitive pairwise comparison matrices over abelian linearly ordered groups. In: Bulucea, C. A., Mladenov, V., Pop, E., Leba, M., Mastorakis, N. (eds.) Recent advances in Applied Mathematics, World Scientific and Engineering Academy and Society (WSEAS), pp. 207–212. Stevens Point Wisconsin, USA (2009b)
Cavallo, B., D’Apuzzo, L.: Characterizations of consistent pairwise comparison matrices over abelian linearly ordered groups. Int. J. Intell. Syst. 25(10), 1035–1059 (2010)
Cavallo, B., D’Apuzzo, L.: Deriving weights from a pairwise comparison matrix over an alo-group. Soft Comput. 16(2), 353–366 (2012a)
Cavallo, B., D’Apuzzo, L.: Investigating properties of the \(\odot \)-consistency index. In: IPMU (4), pp. 315–327 (2012b)
Cavallo, B., D’Apuzzo, L., Squillante, M.: Building consistent pairwise comparison matrices over abelian linearly ordered groups, pp. 237–248. In: ADT (2009)
Cavallo, B., DApuzzo, L., Marcarelli, G.: Pairwise comparison matrices: some issue on consistency and a new consistency index. In: Greco, S., Marques Pereira, R., Squillante, M., Yager, R., Kacprzyk, J. (eds.) Preferences and Decisions, Studies in Fuzziness and Soft Computing, vol. 257, pp. 111–122. Springer, Heidelberg (2010)
Cavallo, B., D’Apuzzo, L., Squillante, M.: About a consistency index for pairwise comparison matrices over a divisible alo-group. Int. J. Intell. Syst. 27(2), 153–175 (2012)
Chin, F.Y.: Security problems on inference control for sum, max, and min queries. J. ACM 33(3), 451–464 (1986)
CRISES: Unesco chair in data privacy. http://unescoprivacychair.urv.cat/presentacio.php (2007). Accessed 20 Dec 2012
Dalenius, T.: A simple procedure for controlled rounding. Statistik Tidskrift 3, 202–208 (1981)
Denning, D.E.: Secure statistical databases with random sample queries. ACM Trans. Database Syst. 5(3), 291–315 (1980)
Denning, D.E., Denning, P.J., Schwartz, M.D.: The tracker: a threat to statistical database security. ACM Trans. Database Syst. 4(1), 76–96 (1979)
Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: Proceedings of the International Conference on Principles of Data Systems (PODS), pp. 202–210, (2003)
Dobkin, D.P., Jones, A.K., Lipton, R.J.: Secure databases: protection against user influence. ACM Trans. Database Syst. 4(1), 76–96 (1979)
Fellegi, I.P.: On the question of statistical confidentiality. J. Am. Stat. Assoc. 67(337), 7–18 (1972)
GIC: Group insurance commission testimony before the massachusetts health care committee (See Session of the Joint Committee on Health Care, Massachusetts State Legislature) (1997)
Heckerman, D.: Causal independence for knowledge acquisition and inference, pp. 122–127. In: Proceedings of Ninth Conference on Uncertainty in Artificial Intelligence, (1993)
IBM: Ibm privacy research institute. http://www.research.ibm.com/privacy/ (2001). Accessed 20 Dec 2012
Kenthapadi, K., Mishra, N., Nissim, K.: Simulatable auditing, In: PODS, pp. 118–127 (2005)
Kleinberg, J., Papadimitriou, C., Raghavan, P.: Auditing boolean attributes. J. Comput. Syst. Sci. 66(1), 244–253 (2003)
Malvestuto, F.M., Mezzini, M., Moscarini, M.: Auditing sum-queries to make a statistical database secure. ACM Trans. Inf. Syst. Secur. 9(1), 31–60 (2006)
Matloff, N.E.: Another look at the use of noise addition for database security, pp. 173–180. In: Proceedings of IEEE Symposium on Security and Privacy, (1986)
Nabar, S.U., Marthi, B., Kenthapadi, K., Mishra, N., Motwani, R.: Towards robustness in query auditing, pp. 151–162. In: International Conference on Very Large Data Bases (2006)
NAHDO, : A Guide to State-Level Ambulatory Care Data Collection Activities. National Association of Health Data Organizations (NAHDO), Falls Church (1996)
Olesen, K., Kjaerulff, U., Jensen, F., Jensen, F., Falck, B., Andreassen, S., Andersen, S.: A munin network for the median nerve-a case study in loops. Appl. Artif. Intell. 3(2–3), 385–403 (1989)
Pearl, J.: Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, San Francisco (1998)
PrivacyTrust: Privacy policy requirements. http://www.privacytrust.org/certification/privacy/privacy_requirements.html (2002). Accessed 20 December 2012
Saaty, T.L.: A scaling method for priorities in hierarchical structures. J. Math. Psychol. 15, 234–281 (1977)
Saaty, T.L.: The Analytic Hierarchy Process. McGraw-Hill, New York (1980)
Saaty, T.L.: Axiomatic foundation of the analytic hierarchy process. Manag. Sci. 32(7), 841–855 (1986)
Saaty, T.L.: Decision Making for Leaders. University of Pittsburgh, Pittsburgh (1988)
Saaty, T.L.: Decision making with the analytic hierarchy process. Int. J. Serv. Sci. 1(1), 83–98 (2008)
Saaty, T.L., Zoffer, H.J.: Negotiating the israeli-palestinian controversy from a new perspective. Int. J. Inf. Technol. Decis. Mak. 10(1), 5–64 (2011)
Schlorer, J.: Identification and retrieval of personal records from a statistical bank. Methods Inform. Med. 14, 7–13 (1975)
Srinivas, S.: A generalization of the noise-or-model, pp. 208–218. In: Ninth Annual Conference of Uncertainty on AI, 1993
Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowledge-Based Syst. 10(5), 557–570 (2002)
TR35-GI: Protezione della privacy dei dati mediante reti bayesiane. Technol. Rev. 2, 10 (2011)
Traub, J.F., Yemini, Y., Wozniakowski, H.: The statistical security of a statistical database. ACM Trans. Database Syst. 9(4), 672–679 (1984)
Vargas, R.V.: Using the analytic hierarchy process (ahp) to select and prioritize projects in a portfolio. PMI Global Congress 2010 North America http://www.ricardo-vargas.com/wp-content/uploads/downloads/articles/ricardo_vargas_ahp_project_selection_en.pdf (2010). Accessed 20 December 2012
Warner, S.L.: Randomized response: a survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc. 60(309), 63–69 (1965)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Cavallo, B., Canfora, G., D’Apuzzo, L. et al. Reasoning under uncertainty and multi-criteria decision making in data privacy. Qual Quant 48, 1957–1972 (2014). https://doi.org/10.1007/s11135-013-9859-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11135-013-9859-8