A Survey of Query Auditing Techniques for Data Privacy
نویسندگان
چکیده
17.1 Introduction This chapter is a survey of query auditing techniques for detecting and preventing disclosures in a database containing private data. Informally, auditing is the process of examining past actions to check whether they were in conformance with official policies. In the context of database systems with specific data disclosure policies, auditing is the process of examining queries that were answered in the past to determine whether answers to these queries could have been used by an individual to ascertain confidential information forbidden by the disclosure policies. Techniques used for detecting disclosures could potentially also be used or extended to prevent disclosures, and so in addition to the retroactive auditing mentioned above, researchers have also studied an online
منابع مشابه
Private Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملTechniques for Auditing the ICT Carbon Footprint of an Organisation
This article has presents an extensive survey of the state of the art in Green IT/S. The findings of the survey suggest that there is scope for a reliable carbon footprint auditing tool for organisational ICT usage. A prototype auditing tool is developed and a trial audit carried out and evaluated. Conclusions include the need for automation of the audit, the need for consistent management of h...
متن کاملDenials leak information: Simulatable auditing
a r t i c l e i n f o a b s t r a c t Imagine a data set consisting of private information about individuals. The online query auditing problem is: given a sequence of queries that have already been posed about the data, their corresponding answers and given a new query, deny the answer if privacy can be breached or give the true answer otherwise. We investigate the fundamental problem that que...
متن کاملDifferential Privacy for Sum Queries without External Noise
We consider privacy issues in statistical database and data mining where queries are executed on data collected from a large number of individuals. It is generally established that a strong notion of privacy is guaranteed if the results are perturbed by random noise with sufficient variance (e.g., [5, 27, 44]). In this paper, we point out a vulnerability in such an approach and show that for so...
متن کاملLog Sanitization: Auditing a Database Under Retention Restrictions
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a historical record of the past that can also pose a serious threat to privacy. Policies which limit data retention conflict with the goal of accurate auditing, and data owners have to carefully balance the need for policy co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008