skip to main content
article
Free Access

Security problems on inference control for SUM, MAX, and MIN queries

Published:01 May 1986Publication History
Skip Abstract Section

Abstract

The basic inference problem is defined as follows: For a finite set X = {xi, … , xn}, we wish to infer properties of elements of X on the basis of sets of "queries" regarding subsets of X. By restricting these queries to statistical queries, the statistical database (SDB) security problem is obtained. The security problem for the SDB is to limit the use of the SDB so that only statistical information is available and no sequence of queries is sufficient to infer protected information about any individual. When such information is obtained the SDB is said to be compromised. In this paper, two applications concerning the security of the SDB are considered:

  • On-line application. The queries are answered one by one in sequence and it is necessary to determine whether the SDB is compromised if a new query is answered.

  • Off-line application. All queries are available at the same time and it is necessary to determine the maximum subset of queries to be answered without compromising the SDB.

The complexity of these two applications, when the set of queries consists of (a) a single type of SUM query, (b) a single type of MAX/MIN query, (c) mixed types of MAX and MIN queries, (d) mixed types of SUM and MAX/MIN queries, and (e) mixed types of SUM, MAX, and MIN queries, is studied. Efficient algorithms are designed for some of these situations while others are shown to be NP-hard.

References

  1. 1 ACHUGBUE, J. D., AND CHIN, F.Y. The effectiveness of output modification by rounding for protection of statistical databases. INFOR 17, 3 (1979), 209-218.Google ScholarGoogle Scholar
  2. 2 BECK, L.L. A security mechanism for statistical databases. ACM Trans. Database Syst. 5, 3 (Sept. 1980), 316-338. Google ScholarGoogle Scholar
  3. 3 CHIN, F.Y. Security in statistical databases for queries with small counts. ACM Trans. Database Syst. 3, I (Mar. 1978), 92-104. Google ScholarGoogle Scholar
  4. 4 CHIN, F. Y., AND KOSSOWSKI, P. Efficient inference control for range sum queries on statistical databases. In Proceedings of the 1st LBL Workshop on Statistical Database Management (Dec.). Menlo Park, Calif., 198 l, pp. 239-248. Google ScholarGoogle Scholar
  5. 5 CHIN, F. Y., AND KOSSOWSKI, P. The theory of secure policies for inference control by auditing in statistical databases (unpublished manuscript).Google ScholarGoogle Scholar
  6. 6 CHIN, F. Y., AND OZSOYOGLU, G. Statistical database design. ACM Trans. Database Syst. 6, l (Mar. 1981), 113-139. Google ScholarGoogle Scholar
  7. 7 CHIN, F. Y., AND OZSOYOGLU, G. Auditing and inference control in statistical databases. IEEE Trans. Softw. Eng. SE-8, 6 (Nov. 1982), 574-582.Google ScholarGoogle Scholar
  8. 8 DAVIDA, G., LINTON, D., SZELAG, G., AND WELLS, D. Security of statistical databases. IEEE Trans. Softw. Eng. SE-4, 6 (Nov. 1978), 531-533.Google ScholarGoogle Scholar
  9. 9 DEMILLO, R., DOBKIN, D., AND LIPTON, R.j. Combinatorial inference. In Foundations of Secure Computation, R. DeMillo et al., Eds. Academic Press, Orlando, Fla., 1978, pp. 27-38 (presented at a 3-day workshop held at Georgia Institute of Technology, Atlanta, Oct. 1977).Google ScholarGoogle Scholar
  10. 10 DENNING, D.E. Secure statistical databases with random sample queries. ACM Trans. Database Syst. 5, 3 (Sept. 1980), 291-315. Google ScholarGoogle Scholar
  11. 11 DENNING, O. E., DENNING, P. J., AND SCHWARTZ, M. O. The tracker: A threat to statistical database security. ACM Trans. Database Syst. 4, l (Mar. 1979), 76-96. Google ScholarGoogle Scholar
  12. 12 GAREY, M., JOHNSON, D., AND STOCKMEYER, L. Some simplified NP-complete graph problems. J. Theoret. Comput. Sci. I (1976), 237-267.Google ScholarGoogle Scholar
  13. 13 KAM, J. B. AND ULLMAN, J.D. A model of statistical databases and their security. ACM Trans. Database Syst. 2, l (Mar. 1977), 1-10. Google ScholarGoogle Scholar
  14. 14 REISS, S.P. Medians and database security. In Foundations of Secure Computations. Academic Press, Orlando, Fla., 1978, pp. 57-92.Google ScholarGoogle Scholar
  15. 15 REISS, S.P. Security in databases: A combinatorial study. J. ACM 26, l (Jan. 1979), 45-57. Google ScholarGoogle Scholar
  16. 16 SCHLORER, J. Disclosure from statistical databases: Quantitative aspects of trackers. ACM Trans. Database Syst. 5, 4 (Dec. 1980), 467-492. Google ScholarGoogle Scholar
  17. 17 Yu, C. T., AND CHIN, F.Y. A study on the protection of statistical databases. In Proceedings of the ACM SIGMOD International Conference on Management of Data. ACM, New York, 1977, pp. 169-181. Google ScholarGoogle Scholar

Index Terms

  1. Security problems on inference control for SUM, MAX, and MIN queries

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image Journal of the ACM
            Journal of the ACM  Volume 33, Issue 3
            July 1986
            219 pages
            ISSN:0004-5411
            EISSN:1557-735X
            DOI:10.1145/5925
            Issue’s Table of Contents

            Copyright © 1986 ACM

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 May 1986
            Published in jacm Volume 33, Issue 3

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader