Relative Compromise of Statistical Databases

نویسندگان

  • Mirka Miller
  • Jennifer Seberry
چکیده

Statistical databases are databases in which only statistical type of queries are allowed. The results of the statistical queries are intended for statistical use only. However, it has been shown that using only statistical queries it is often possible to infer an individuals's value of a protected field (e.g, using various types of trackers). In such a case we say that the database has been (positively) compromised. Various types of compromise have been studied but until now attention has centred on the inference of exact information from permitted queries. In this paper we introduce a new type of compromise, the 'relative' compromise: a set of records is relatively compromised with respect to a field X if the relative order of magnitude of the X-values of the set is known. This paper shows that even when exact information is protected, relative information may be accessible. We consider several sets of conditions under which this compromise can occur using SUM type of queries of fixed query set size, as well as some of the possible consequences of relative compromise. Disciplines Physical Sciences and Mathematics Publication Details Miller, M and Seberry, J, Relative compromise of statistical databases, ACSC12 and The Australian Computer Journal, 21(2), 1989, 56-61. This journal article is available at Research Online: http://ro.uow.edu.au/infopapers/1036 Relative compromise of statistical databases M. Miller Department of Mathematics, Statistics and Computing Science, University of New England, Annidale, NSW J. Seberry Department of Computer Science, University College, ADFA, Canberra, ACT Statistical databases are databases in which only statistical type of queries are aUowed The results of the statistical queries are intended for statistical use only. However, it has been shown that using only statistical queries it is often possible to infer an individlUll's value of a protected fleW (e.g., using various types of trackers), In such a case we say that the database has been (positively) compromised Various types of compromise have been studied but until now attention has centred on the inference of exact information from pennitted queries. In this paper we introduce a new type of compromise, the 'relative' compromise: a set of records is relatively compromised with respect to a field X if the relative order of magnitude of the X -values of the set is known This paper shows that even when exact infonnation is protected, relative infonnation may be accessible. We consider several sets of conditions under which this compromise can occur using SUM type of queries of fixed query set size, as well as some of the possible consequences of relative compromise.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Declarative Information Extraction in a Probabilistic Database System

Full-text documents represent a large fraction of the world’s data. Although not structured per se, they often contain snippets of structured information within them: e.g., names, addresses, and document titles. Information Extraction (IE) techniques identify such structured information in text. In recent years, database research has pursued IE on two fronts: declarative languages and systems f...

متن کامل

Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise

This paper reports on a method for protecting statistical databases against inference, developed over the past four years. The method, called randomizing, is conceptually elegant, easy to implement at very small additional cost, and requires no on-going maintenance. It can be equally applied to small and medium-size as well as large databases, because it does not depend on sampling techniques i...

متن کامل

Supplier selection using compromise ranking and outranking methods

In today’s highly competitive manufacturing environment, an effective supplier selection process is very important for the success of any business organization. Selection of the best supplier is always a difficult task for the purchasing manager. Suppliers have varied strengths and weaknesses which require careful assessment by the purchasing manager before selecting and ranking them. Any suppl...

متن کامل

2-Compromise Usability in 1-Dimensional Statistical Databases

Statistical database security is an important problem that has major implications for privacy and protection in the computerised, online world. In this paper we prove that the bounds on the number of answerable range queries in a 1-dimensional statistical database of size n for n odd, or n even and greater than 52, derived in [4] in fact hold for all n except for n = 12, and are achievable usin...

متن کامل

A NEW APPROACH IN FAILURE MODES AND EFFECTS ANALYSIS BASED ON COMPROMISE SOLUTION BY CONSIDERING OBJECTIVE AND SUBJECTIVE WEIGHTS WITH INTERVAL-VALUED INTUITIONISTIC FUZZY SETS

Failure modes and effects analysis (FMEA) is a well-known risk analysis approach that has been conducted to distinguish, analyze and mitigate serious failure modes. It demonstrates the effectiveness and the ability of understanding and documenting in a clear manner; however, the FMEA has weak points and it has been criticized by some authors. For example, it does not consider relative importanc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Australian Computer Journal

دوره 21  شماره 

صفحات  -

تاریخ انتشار 1989