Asymptotic Conditional Probabilities for Conjunctive Queries

نویسندگان

  • Nilesh N. Dalvi
  • Gerome Miklau
  • Dan Suciu
چکیده

Two seemingly unrelated applications call for a renewed study of probabilistic properties of logical formulas. One is the study of information about a sensitive query which is disclosed by a public view [10]. The other is a study of queries with uncertain predicates [1]. Both have been studied using a certain probabilistic model, which, as we show here has some limitations. In this paper we propose a new probabilistic model of databases, considered before for random graphs [12, 9] but not for databases, and study properties of conjunctive queries under this new model. This model provides a characterization of information disclosure between a query and view, with query answerability at one end of the spectrum, and logical independence (or perfect security) at the other. Motivation 1: Information Disclosure We start by illustrating the limitation of the probabilistic model in [10]. The owner of a database I wishes to publish a view V (I) over the database, and would like to determine whether certain sensitive information is disclosed by the view. The sensitive data is expressed in terms of a query, called the sensitive query, Q(I). The query-view security problem requires one to check whether the view V does not leak any secret information about the query. In [10] this problem is modeled by comparing the a priori knowledge an adversary possesses about Q(I), with the knowledge about Q(I) given V (I). The adversary’s knowledge is described as the probability of Q(I) attaining a certain value, when I is chosen randomly. If both the view and the sensitive query are boolean, the a priori probability is P(Q), while the a posteriori probability is the conditional probability P(Q | V ). When the two values are identical, then the query is said to be perfectly secure w.r.t. the view. The work in [10] is focused on deciding, for conjunctive queries Q and V , when perfect security holds. Notice that the definition is for one fixed domain and probability distribution, although the results in [10] show that it is largely independent of both. The problem is that perfect security is often too restrictive for practical purposes, rejecting as insecure query-view pairs that are probably acceptable in practice. This is illustrated in the following example:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Constant Delay Enumeration for Acyclic Conjunctive Queries over X Structures

We present an efficient answer enumeration algorithm for an extension of Conditional XPath with variables, which is a first-order complete query language for unranked trees of bounded depth. Our algorithm requires constant delay and linear preprocessing time for fixed queries, while depending linearly on the size of the query. It is based on a new enumeration algorithm for disjunctions of acycl...

متن کامل

Efficient Evaluation of HAVING Queries on a Probabilistic Database

We study the evaluation of positive conjunctive queries with Boolean aggregate tests (similar to HAVING queries in SQL) on probabilistic databases. Our motivation is to handle aggregate queries over imprecise data resulting from information integration or information extraction. More precisely, we study conjunctive queries with predicate aggregates using MIN, MAX, COUNT, SUM, AVG or COUNT(DISTI...

متن کامل

On Psi-conditional asymptotic stability of first order nonlinear matrix Lyapunov system

We provide necessary and sucient conditions for psi-conditional as-ymptotic stability of the solution of a linear matrix Lyapunov system and sucientconditions for psi -conditional asymptotic stability of the solution of a rst ordernon-linear matrix Lyapunov system X0 = A(t)X + XB(t) + F(t;X).

متن کامل

Open-World Probabilistic Databases

Large-scale probabilistic knowledge bases are becoming increasingly important in academia and industry alike. They are constantly extended with new data, powered by modern information extraction tools that associate probabilities with database tuples. In this paper, we revisit the semantics underlying such systems. In particular, the closed-world assumption of probabilistic databases, that fact...

متن کامل

Asymptotic Conditional Probabilities: The Unary Case

Motivated by problems that arise in computing degrees of belief, we consider the problem of computing asymptotic conditional probabilities for first-order sentences. Given firstorder sentences φ and θ, we consider the structures with domain {1, . . . , N} that satisfy θ, and compute the fraction of them in which φ is true. We then consider what happens to this fraction as N gets large. This ext...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005