Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2022

01-12-2022

Reactive and Proactive Methods for Database Protection against Logical Inference Attacks

Author: A. A. Poltavtsev

Published in: Automatic Control and Computer Sciences | Issue 8/2022

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

If data is not available to the outside world, it is useless. It must be available so that it can be processed and planned. Regulating and monitoring user access to a database is an important task for the database security community. Protecting a database against logical inference attacks is part of information security to prevent the disclosure of sensitive data through available information (tables and individual records). It is necessary to have methods capable of maintaining a balance between the use of information and the protection of data. The purpose of this work is to compare different inference control methods in order to evaluate the results of methods to minimize both the loss of information and the risk of information disclosure.
Literature
4.
go back to reference Aleksandrova, E.B., Post-quantum primitives in information security, Nonlinear Phenom. Complex Syst., 2019, vol. 22, no. 3, pp. 269–276.MATH Aleksandrova, E.B., Post-quantum primitives in information security, Nonlinear Phenom. Complex Syst., 2019, vol. 22, no. 3, pp. 269–276.MATH
5.
go back to reference Aleksandrova, E.B., Poltavtseva, M.A., and Shmatov, V.S., Ensuring the big data integrity through verifiable zero-knowledge operations, Mobile Internet Security. MobiSec 2021, You, I., Kim, H., Youn, TY., Palmieri, F., and Kotenko, I., Eds., Communications in Computer and Information Science, vol. 1544, Singapore: Springer, 2022, pp. 211–221. https://doi.org/10.1007/978-981-16-9576-6_15 Aleksandrova, E.B., Poltavtseva, M.A., and Shmatov, V.S., Ensuring the big data integrity through verifiable zero-knowledge operations, Mobile Internet Security. MobiSec 2021, You, I., Kim, H., Youn, TY., Palmieri, F., and Kotenko, I., Eds., Communications in Computer and Information Science, vol. 1544, Singapore: Springer, 2022, pp. 211–221.  https://​doi.​org/​10.​1007/​978-981-16-9576-6_​15
7.
go back to reference Poltavtseva, M.A. and Kalinin, M.O., Conceptual data modeling using aggregates to ensure large-scale distributed data management systems security, Intelligent Distributed Computing XIII. IDC 2019, Kotenko, I., Badica, C., Desnitsky, V., El Baz, D., and Ivanovic, M., Eds., Studies in Computational Intelligence, vol. 868, Cham: Springer, 2020, pp. 41–47. https://doi.org/10.1007/978-3-030-32258-8_5 Poltavtseva, M.A. and Kalinin, M.O., Conceptual data modeling using aggregates to ensure large-scale distributed data management systems security, Intelligent Distributed Computing XIII. IDC 2019, Kotenko, I., Badica, C., Desnitsky, V., El Baz, D., and Ivanovic, M., Eds., Studies in Computational Intelligence, vol. 868, Cham: Springer, 2020, pp. 41–47. https://​doi.​org/​10.​1007/​978-3-030-32258-8_​5
9.
go back to reference Poltavtseva, M. and Tick, A., Automatic control approach to the cyber-physical systems security monitoring, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungvari, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 17–30. https://doi.org/10.1007/978-3-030-93872-7_2 Poltavtseva, M. and Tick, A., Automatic control approach to the cyber-physical systems security monitoring, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungvari, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 17–30. https://​doi.​org/​10.​1007/​978-3-030-93872-7_​2
12.
go back to reference Domingo-Ferrer, J. and Torra, V., Disclosure control methods and information loss for microdata, Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies, 2001, pp. 91–110. Domingo-Ferrer, J. and Torra, V., Disclosure control methods and information loss for microdata, Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies, 2001, pp. 91–110.
13.
go back to reference Domingo-Ferrer, J., Microaggregation for protecting individual data privacy, Proceso de Toma de Decisiones, Modelado y Agregacion de Preferencias TIC-2002-11492-E, 2005, pp. 171–178. Domingo-Ferrer, J., Microaggregation for protecting individual data privacy, Proceso de Toma de Decisiones, Modelado y Agregacion de Preferencias TIC-2002-11492-E, 2005, pp. 171–178.
16.
go back to reference Domingo-Ferrer, J. and Mateo-Sanz, J.M., On the security of cell suppression in contingency tables with quantitative factors, Proc. 3rd Int. Seminar on Statistical Confidentiality, 1996, pp. 208–217. Domingo-Ferrer, J. and Mateo-Sanz, J.M., On the security of cell suppression in contingency tables with quantitative factors, Proc. 3rd Int. Seminar on Statistical Confidentiality, 1996, pp. 208–217.
17.
go back to reference Domingo-Ferrer, J., Oganian, A., and Torra, V., Information-theoretic disclosure risk measures in statistical disclosure control of tabular data, Proc. 14th Int. Conf. on Scientific and Statistical Database Management, Edinburgh, 2002, IEEE, 2002, pp. 227–231. https://doi.org/10.1109/SSDM.2002.1029724 Domingo-Ferrer, J., Oganian, A., and Torra, V., Information-theoretic disclosure risk measures in statistical disclosure control of tabular data, Proc. 14th Int. Conf. on Scientific and Statistical Database Management, Edinburgh, 2002, IEEE, 2002, pp. 227–231.  https://​doi.​org/​10.​1109/​SSDM.​2002.​1029724
19.
go back to reference Chakravarthi, R., Shafer, G., and Raman, S., Inference detection using clustering, PhD Thesis, 2001. Chakravarthi, R., Shafer, G., and Raman, S., Inference detection using clustering, PhD Thesis, 2001.
21.
go back to reference Hoffman, L.J. and Miller, W.F., Getting a personal dossier from a statistical data bank, Datamation, 1970, vol. 16, no. 5, pp. 74–75. Hoffman, L.J. and Miller, W.F., Getting a personal dossier from a statistical data bank, Datamation, 1970, vol. 16, no. 5, pp. 74–75.
22.
go back to reference Schlörer, J., Confidentiality and security in statistical data banks, Proc. Workshop on Data Documentation, Reisensburg Castle, Germany, 1975, Munich: Verlag Documentation, 1977, pp. 101–123. Schlörer, J., Confidentiality and security in statistical data banks, Proc. Workshop on Data Documentation, Reisensburg Castle, Germany, 1975, Munich: Verlag Documentation, 1977, pp. 101–123.
Metadata
Title
Reactive and Proactive Methods for Database Protection against Logical Inference Attacks
Author
A. A. Poltavtsev
Publication date
01-12-2022
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2022
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S014641162208017X

Other articles of this Issue 8/2022

Automatic Control and Computer Sciences 8/2022 Go to the issue