Functional dependencies and their connection with security of statistical databases

Abstract The term “security of a statistical database” usually refers to the problem of inference control. There are two main categories of inference controls in statistical databases: restrictions and perturbations. The influence of functional dependencies (which may hold among attributes in a statistical database) on restriction techniques is studied. For some techniques, either on the table or cell level, we demonstrate how these dependencies might lead to a compromise. It is shown that functional dependencies may decrease the effectiveness of several known inference controls (more precisely: output restriction controls). For some methods we give the way to overcome nondesirable influence of dependencies on control techniques.

[1]  Dorothy E. Denning,et al.  Memoryless Inference Controls for Statistical Databases , 1982, 1982 IEEE Symposium on Security and Privacy.

[2]  Zbigniew Michalewicz Compromisability of a statistical database , 1981, Inf. Syst..

[3]  Reind P. van de Riet,et al.  Answering queries without revealing secrets , 1983, TODS.

[4]  Dorothy E. Denning,et al.  A fast procedure for finding a tracker in a statistical database , 1980, TODS.

[5]  L. Cox Suppression Methodology and Statistical Disclosure Control , 1980 .

[6]  Zbigniew Michalewicz Statistical Databases: Their Model, Query Language and Security , 1983, SSDBM.

[7]  Jeffrey D. Ullman,et al.  Principles of Database Systems , 1980 .

[8]  Z. Meral Ozsoyoglu,et al.  Update handling techniques in statistical databases , 1981 .

[9]  Richard J. Lipton,et al.  Even Data Bases That Lie Can Be Compromised , 1978, IEEE Transactions on Software Engineering.

[10]  Jan van Leeuwen On Compromising Statistical Data-Bases with a few Known Elements , 1979, Inf. Process. Lett..

[11]  Dorothy E. Denning,et al.  Inference Controls for Statistical Databases , 1983, Computer.

[12]  Richard J. Lipton,et al.  Secure databases: protection against user influence , 1979, TODS.

[13]  Wiebren de Jonge,et al.  Compromising statistical databases responding to queries about means , 1983, TODS.

[14]  Jeffrey D. Ullman,et al.  A model of statistical database their security , 1977, TODS.

[15]  J. Schlörer Confidentiality of Statistical Records: A Threat-Monitoring Scheme for On Line Dialogue , 1976, Methods of Information in Medicine.

[16]  Gultekin Özsoyoglu,et al.  Statistical database design , 1981, TODS.

[17]  Dorothy E. Denning,et al.  Secure statistical databases with random sample queries , 1980, TODS.

[18]  Gultekin Özsoyoglu,et al.  Enhancing the Security of Statistical Databases with a Question-Answering System and a Kernel Design , 1982, IEEE Transactions on Software Engineering.

[19]  J. Schlörer Identification and Retrieval of Personal Records from a Statistical Data Bank , 1975, Methods of Information in Medicine.

[20]  David L. Wells,et al.  Database Security , 1978, IEEE Transactions on Software Engineering.

[21]  Jan Schlörer,et al.  Security of statistical databases: multidimensional transformation , 1980, TODS.

[22]  Leland L. Beck,et al.  A security machanism for statistical database , 1980, TODS.

[23]  Peter J. Denning,et al.  The tracker: a threat to statistical database security , 1979, TODS.

[24]  Dorothy E. Denning,et al.  A Security Model for the Statistical Database Problem , 1983, SSDBM.

[25]  Peter J. Denning,et al.  Linear queries in statistical databases , 1979, ACM Trans. Database Syst..

[26]  Zbigniew Michalewicz Inference control in statistical databases with incomplete information , 1983, Inf. Syst..

[27]  Francis Y. L. Chin Security in statistical databases for queries with small counts , 1978, TODS.

[28]  Andrew Chi-Chih Yao A Note on a Conjecture of Kam and Ullman Concerning Statistical Databases , 1979, Inf. Process. Lett..